Automated TLS Certificate Installation | TLS Protect Cloud Technical Demo, Venafi

Save Time and Eliminate Outages with Automated Provisioning

|
Save Time and Eliminate Outages with Automated Provisioning Scott Carter Thu, 12/22/2022 - 14:28 9 views Whether or not you relate to the above frustrations, manual processes are linked to a greater risk of errors—especially for critical security functions like machine identities. In general, according to a 2020 study by ... Read More
Microsoft Active Directory

What Is Active Directory and Why Is It Important?

|
What Is Active Directory and Why Is It Important? Scott Carter Mon, 12/19/2022 - 16:57 2 views What Active Directory is and how it works Active Directory (AD) is a directory service that runs on Microsoft Windows Server. Active Directory's primary purpose is to give administrators the ability to manage ... Read More
TLS Certificate Self-Service | TLS Protect Cloud Technical Demo, Venafi

Certificate Self Service: Freedom for Your Team and Cohesion for Your Business

|
Certificate Self Service: Freedom for Your Team and Cohesion for Your Business Scott Carter Thu, 12/15/2022 - 09:26 4 views Removing that machine identity bottleneck represents a critical competitive edge for organizations that face a rapidly evolving marketplace. Giving the team members who need machine identities the ability to procure ... Read More
Fast, Secure Certificate Issuance | TLS Protect Cloud Technical Demo, Venafi

Why You Need to Define and Enforce TLS Machine Identity Policy

|
Why You Need to Define and Enforce TLS Machine Identity Policy Scott Carter Wed, 12/07/2022 - 17:42 1 view In general, security policies are important because they provide protection for your organization. They spell out the rules, expectations, and overall approach your organization uses to maintain the confidentiality, integrity, and ... Read More
compromised android platform certificate

Compromised Platform Certificates Used to Sign Android Malware for Samsung, LG and Others

|
Compromised Platform Certificates Used to Sign Android Malware for Samsung, LG and Others Scott Carter Tue, 12/06/2022 - 17:30 2 views Scott Carter Threat Intelligence You can trust a platform certificate, right? Generally speaking, yes. But, as many Android OEMs recently learned, there can always be a risk of compromise ... Read More
self-signed-certificates

Self-Signed Certificates: Cybercriminals Are Turning This Strength into a Vulnerability

|
Self-Signed Certificates: Cybercriminals Are Turning This Strength into a Vulnerability Scott Carter Mon, 11/07/2022 - 17:00 29623 views The risk of self-signed certificates  When compared with certificates signed by CAs, self-signed certificates are often viewed as less trustworthy because they have not been vetted through official channels. With signed certificates, ... Read More
How Does a Browser Trust a Certificate?

How Does a Browser Trust a Certificate?

|
How Does a Browser Trust a Certificate? Scott Carter Mon, 10/31/2022 - 17:00 6490 views Browsers prevent this type of manipulation by authenticating HTTPS servers using certificates, which are digital documents that bind a public key to an individual subject. The binding is asserted by having a trusted Certification Authority ... Read More
What is Symmetric Encryption? Simply Explained | Venafi Chalk Talk

What Are the Best Use Cases for Symmetric vs Asymmetric Encryption?

|
What Are the Best Use Cases for Symmetric vs Asymmetric Encryption? Scott Carter Tue, 09/20/2022 - 17:00 66784 views Symmetric Encryption In symmetric encryption, the sender and receiver use a separate instance of the same key to encrypt and decrypt messages. Symmetric encryption heavily relies on the fact that the ... Read More
zero-trust-for-machine-identities

Using Machine Identity Management to Extend Zero Trust to Partners

|
Using Machine Identity Management to Extend Zero Trust to Partners Scott Carter Thu, 09/15/2022 - 16:00 191 views Authorizing external partners adds a layer of complexity Authorizing access is already challenging enough for organizations that are interacting with their own employees, their own systems, their own machines. I wrote about ... Read More
Does TCP Fast Open Improve TLS handshakes?

Does TCP Fast Open Improve TLS handshakes?

|
Does TCP Fast Open Improve TLS handshakes? Scott Carter Tue, 08/16/2022 - 17:00 3573 views What is TCP Fast Open? This is where TFO or TCP Fast Open comes in handy. TCP Fast Open is an extension to speed up the opening of successive TCP connections between two endpoints. It ... Read More