let's encrypt revoke

How to Revoke a Let’s Encrypt Certificate

|
How to Revoke a Let's Encrypt Certificate kdobieski Wed, 01/30/2019 - 13:11 Revocation The problem we have with certificates is that they can, at the time of writing, be valid for up to 39 months and we need to look after them during that time. If we lose the key ... Read More
telcos certificate management

Telcos Discover the Value of Machine Identities in Protecting Revenue

|
Telcos Discover the Value of Machine Identities in Protecting Revenue kdobieski Tue, 01/29/2019 - 08:46 Speaking with a local wireless carrier about protecting their machine identities a month or two ago, I learned that they have been having trouble with WiFi data offloading hacks. But before we get into the ... Read More
The Importance of Machine Identities in Detecting Look-alike Sites

The Importance of Machine Identities in Detecting Look-alike Sites

|
The Importance of Machine Identities in Detecting Look-alike Sites kdobieski Wed, 01/23/2019 - 06:38 Using fake domains that substitute a few characters in the URLs, cyber attackers can point to malicious online shopping sites that mimic legitimate, well-known retail websites. As a result, it has become increasingly difficult for customers ... Read More
machine identity security automation

Are You Leaving Your Machines Naked and Afraid?

|
Are You Leaving Your Machines Naked and Afraid? kdobieski Tue, 01/22/2019 - 12:44 Many times, when I ask about DevOps, the operational or security teams (even at C level) are not actually aware of what is happening in the business units. DevOps is sort of like the secret-men-and-women of the ... Read More
certificate management costs

Management Mayhem, Part 3: How to Avoid the Hidden Costs of Certificate Management

|
Management Mayhem, Part 3: How to Avoid the Hidden Costs of Certificate Management kdobieski Tue, 01/22/2019 - 06:30 Not only that, but the demand for machine identities continues to sky rocket, driven largely by cloud and DevOps initiatives. Developers need security at speed, and that is not negotiable. However, current ... Read More
What Are Common Certificate Validation Flaws?

What Are Common Certificate Validation Flaws?

|
What Are Common Certificate Validation Flaws? kdobieski Mon, 01/21/2019 - 11:31 The SSL/TLS certificate for the website is not trusted An internet browser will state that a website certificate is untrusted if that certificate has not been signed by a trusted Certificate Authority (CA). In order for a browser to ... Read More
HSM Hardware Security Module integrate

Why Integrate Machine Identities with Hardware Security Modules?

|
Why Integrate Machine Identities with Hardware Security Modules? kdobieski Fri, 01/18/2019 - 12:22 Integrating machine identity protection with a central HSM to generate key pairs will deliver keys created with strong random number generation. This allows the machine identity protection platform to orchestrate the connection to the system that needs ... Read More
ssl traffic encrypted cyber attack

Is Your SSL Traffic Hiding Attacks?

|
Is Your SSL Traffic Hiding Attacks? kdobieski Thu, 01/17/2019 - 11:22 The results of a Gartner survey show that, “Less than 20% of organizations with a firewall, an intrusion prevention system (IPS) or a unified threat management (UTM) appliance decrypt inbound or outbound SSL traffic.” Therefore, in over 80% of ... Read More
Revocation is Broken

Revocation is Broken

|
Revocation is Broken kdobieski Wed, 01/16/2019 - 14:22 Not only are we continuing to deploy HTTPS, the rate at which we're doing so is increasing too. This is what real progress looks like. The process of obtaining a certificate has become more and more simple over time and now, thanks ... Read More
automation certificate management Venafi

Why You Need Automation for Certificate Management

|
Why You Need Automation for Certificate Management kdobieski Mon, 01/14/2019 - 06:46 Conducting digital tasks manually which could be more effective when automated is having a detrimental impact on large organizations with legacy IT infrastructure and existing operations. Business consulting firm Protiviti just released a study which surveyed the world’s ... Read More