Venafi Enterprise Mobility Protect: Machine Identity Intelligence Across Mobile Devices

Want Machine Identity Intelligence Across Mobile Devices? Check Out Venafi Enterprise Mobility Protect.

|
Want Machine Identity Intelligence Across Mobile Devices? Check Out Venafi Enterprise Mobility Protect. bwhitlock Thu, 06/28/2018 - 10:22 “As businesses embrace BYOD policies, organizations have multiple teams issuing and using machine identities for mobile devices,” said Kevin Bocek, vice president of security strategy and threat intelligence at Venafi. “Venafi makes ... Read More
STARTTLS Everywhere: Properly Configuring Machine Identities for TLS Encryption on Email Servers

STARTTLS Everywhere: Properly Configuring Machine Identities for TLS Encryption on Email Servers

|
STARTTLS Everywhere: Properly Configuring Machine Identities for TLS Encryption on Email Servers bwhitlock Thu, 06/28/2018 - 08:52 STARTTLS aims to simplify the installation of email encryption by providing an extension of the SMTP email-sending protocol that takes an existing insecure connection and upgrades it to a secure connection using TLS ... Read More
Temporal Sharding Helps to Ease the Challenge of Growing CT Log Scale

How Temporal Sharding Helps to Ease the Challenge of Growing CT Log Scale

|
How Temporal Sharding Helps to Ease the Challenge of Growing CT Log Scale bwhitlock Wed, 06/27/2018 - 08:28 PKI: How It Disagrees with Google’s Policy As defined by TechTarget, PKI consists of rules and policies that support the distribution and identification of public encryption keys necessary for users to exchange ... Read More
Internet of Things and Machine Identity Protection

The Internet of Things and Machine Identity Protection: The Lack of Security

|
The Internet of Things and Machine Identity Protection: The Lack of Security bwhitlock Mon, 06/25/2018 - 09:18 The Insecurity of the Internet of Things The issue with so many of these devices on the market is that each has a relatively short life span. This usually means there is little ... Read More
Chain Certificate for EV Multi-Domain Certificates

What Is a Chain Certificate for EV Multi-Domain Certificates?

|
What Is a Chain Certificate for EV Multi-Domain Certificates? bwhitlock Thu, 06/21/2018 - 13:04 Companies obtain root certificates from only trusted CAs, or entities which are authorized to verify someone's identity. Most web browsers and operating systems ship out to consumers with a trust store containing a list of trusted ... Read More