
NIST Announces the First 3 Post-Quantum Cryptography Standards – Ready or Not?
The Wait is Over. It’s Ready, Set, Go for PQC Migration! After 8 long years of rigorous research and relentless effort, the U.S. National Institute of Standards and Technology (NIST) has released the first set of finalized post-quantum encryption standards today. This is a landmark achievement that marks the beginning ... Read More

Key Lessons To Learn From Entrust Certificate Distrust
Google’s decision to distrust Entrust must not be seen solely from the point of CA failures and complacency. It is essential to take a broader look and understand the critical need for Crypto and CA-agility in preparing for future changes and threats. Last week, Google announced its decision to distrust ... Read More

Attention: Google To Distrust Entrust TLS Certificates
Crypto-Agility Required to Migrate to a New Certificate Authority (CA) Seamlessly and Highlights Need for Post-Quantum Cryptography (PQC) Readiness This week Google announced that the Google Chrome browser will no longer trust TLS certificates issued by the Entrust Certificate Authority (CA) starting November 1, 2024. Certificates issued by Entrust before ... Read More

AppViewX Predicts 2024 Is the Year Of Machine Identity Management
Kicking off 2024, AppViewX believes machine identity management and digital identity security will play a pivotal role in how enterprises implement identity-first security and zero trust strategies. With machine identity growth outpacing human identities, especially in cloud and virtualized environments, securing machines, workloads and applications will be a priority. Here ... Read More

DNSSEC – A Foundation For Trust, PKI 2.0 Transformation And Preparation For Post Quantum Cryptography
Domain Name System (DNS) is essential for the proper functioning of the internet and is the first pillar of trust for every digital transaction. Every web page visited, every email, every digital communication leverages DNS to translate human friendly names to machine identifiers (IP addresses). Think of DNS as the ... Read More

Why Machine Identity Management is Core to Cybersecurity
Over the last year, enterprises everywhere scrambled to get their assets and services online—and fast. This behavior not only rapidly accelerated the digital transformation timeline by almost seven years, it also changed the definition of a machine. A machine is no longer just a computer—it’s everything that is included in ... Read More

Why Encryption is Critical to the Healthcare Industry
The recent coronavirus pandemic surfaced the need for quality remote healthcare services. Driven by social distancing measures, doctors had to provide medical services to their remote patients without impacting the quality and accuracy of their diagnosis. The proliferation of connected devices in the healthcare industry allowed this connectivity to materialize ... Read More

EARN IT Act and How Encryption is Related to Freedom of Speech
Since the EARN IT Act was introduced in early March 2020, it was met with strong opposition by privacy groups and academia. The Act has been called “a disaster for Internet users’ free speech and security.” Riana Pfefferkorn, Associate Director of Surveillance and Cybersecurity at the Stanford Center for Internet ... Read More
Top 10 Cyber Security Trends to Watch out for in 2021
Top 10 Cyber Security Trends to Watch out for in 2021 If we look back at 2020, the main theme is disruption. Although business leaders are used to some level of constant change, COVID-19 impacted the world in ways no one could have predicted. As a result, organizations had to ... Read More

Top 10 Cyber Security Trends to Watch out for in 2021
If we look back at 2020, the main theme is disruption. Although business leaders are used to some level of constant change, COVID-19 impacted the world in ways no one could have predicted. As a result, organizations had to pivot and strategize, adapt and change. Organizations should be resilient enough ... Read More