
Pitfalls Of On-Premises Private PKI: Here Are 6 Things That Could Go Wrong
Public key infrastructure (PKI) offers a simple yet efficient way of provisioning, managing, and securing machine identities. With identity and trust at its heart and a powerful combination of authentication and encryption capabilities, PKI helps organizations ensure data privacy, integrity, and security as well as authorize, validate, and authenticate digital ... Read More

11 Ways To Defend The Software Supply Chain From Code Signing Abuse
Recently, a hacker attempted to install a tool for hacking into a customer’s computer by using a fake code signing certificate impersonating the cybersecurity firm Emsisoft. The attacker attempted to spoof or create a fake certificate, using a similar name to Emsisoft, aiming to appear as a legitimate publisher and ... Read More

Certificate-Based Authentication Best Practices For Hardening Enterprise Security
The multinational company, known to provide identity protection and cybersecurity services, Norton LifeLock notified customers in mid-January that over 6,000 of their customer accounts had been compromised as a result of a “stuffing” attack. Stuffing attacks occur when previously compromised passwords are used to gain access to accounts on various ... Read More