Microsoft Deprecates 1024-bit RSA Keys. Are You Prepared to Upgrade?
Krupa Patil | | 1024-bit RSA Keys, certificate authority, certificate lifecycle management, cloud based pki, crypto-agility, Post-Quantum Cryptography, Public CA, RSA keys, TLS certificates
Microsoft recently announced that Windows will no longer support TLS server certificates with RSA encryption keys shorter than 2048 bits. The move is intended to bolster Windows security and promote secure digital interactions. The RSA (Rivest–Shamir–Adleman) algorithm is widely used across all industries, including banking, e-commerce, and telecommunications sectors for ... Read More
Why SSH Certificates Can Be A Better Option For Remote Access Than SSH Keys
Krupa Patil | | certificate authority, iam, identity and access management, private keys, public keys, SSH certificates, SSH Key Management, SSH Keys, SSL/TLS authentication
SSH (Secure Shell) is a secure communication protocol widely used to enable secure access to remote devices and servers over an unsecured network like the Internet. stands as a strong and reliable guardian of data integrity and confidentiality. It has been used for decades to enable secure access to remote ... Read More
9 SSH Key Management Best Practices You Need to Know
Krupa Patil | | Certificate Management, DEVOPS, firewalls, identity and access management, RBAC, SSH Keys
In today’s distributed workplace model, privileged remote access to servers and systems is essential to ensure smooth operations. Secure Shell (SSH) keys play a pivotal role in facilitating this access securely. IT teams worldwide use SSH keys daily for remote system administration, support and maintenance, and file transfers. Because SSH ... Read More
Four Reasons Why SSH Key Management Is Challenging
Krupa Patil | | certificate lifecycle management, SSH Key Management, SSH Keys, SSH servers vulnerable
SSH or secure shell is a secure network protocol that enables two devices or machines to connect and communicate with each other securely over an unsecure network. SSH keys are cryptographic credentials (consisting of a public and a private key pair) used for authenticating and securely accessing computers, servers, machines, ... Read More
AnyDesk Breach Calls Urgent Attention To Code Signing Security
Krupa Patil | | certificate authority, certificate lifecycle management, code signing, code signing keys, DEVOPS, password compromises, private keys
On February 2, 2024, popular remote access solution AnyDesk disclosed that it had suffered a cyberattack that compromised its production systems. AnyDesk revealed that they detected the breach in mid-January during a security audit. They immediately began a forensic investigation that confirmed that the attack began in December 2023. Post ... Read More
Strengthening Medical Device Security With PKI
Krupa Patil | | certificate lifecycle management, digital certificates, IoMT security, PKI, PKI certificates
In the fast-evolving world of healthcare, connected medical devices are revolutionizing diagnostics and patient care. From pacemakers and glucose monitors to advanced imaging systems and smart wearables, these connected medical devices (IoMT – Internet of Medical Things) have become crucial to improving treatment outcomes and helping people manage their health ... Read More
Preparing For India’s New Data Protection Act With Secure Identity Management
Krupa Patil | | certificate lifecycle management automation, Data Security, GDPR, General Data Protection Regulation, Hardware Security Module, PKI, Role-Based Access Control, tls protocol
Data privacy is a global issue. As businesses increasingly collect and process personal information from consumers, they need to take responsibility for protecting the information from theft and misuse. At the same time, consumers need to have a say and better control over how their personal data is being used ... Read More
How Secure Code Signing Aligns With The Principles of DevSecOps
Software supply chain attacks are seeing an unprecedented surge. According to the Sonatype State of the Software Supply Chain Report, twice as many incidents were recorded in 2023 as compared to the cumulative total from 2019-2022. The numbers are stark indicators of the fact that the software supply chain, rich ... Read More
Palo Alto PAN-OS Root and Default Certificates Are Expiring In Two Weeks. What You Need to Know.
Recently, Palo Alto issued a customer advisory on its support portal warning customers about the fast-approaching expiry of the Root Certificate and Default Certificate for PAN-OS. As both certificates are scheduled to expire on December 31, 2023, Palo Alto urged customers to take immediate action to prevent certificate expiration from ... Read More
Are Your Code Signing Processes Mature? A Guide to Navigating Your Code Signing Maturity Journey
On June 1, 2023, the Certificate Authority (CA)/Browser Forum’s new code signing baseline requirements came into effect, enforcing changes to the way organizations handle and protect code signing private keys. According to the new mandate, all publicly trusted code signing private keys must be generated and stored in secure hardware ... Read More