Google Voice Outage: Expired TLS Certificate Brings Down Yet Another Giant

Google Voice Outage: Expired TLS Certificate Brings Down Yet Another Giant

Between February 15th and February 16th, 2021, Google Voice, Google’s telephone service, experienced a worldwide outage that prevented its users from making and receiving Voice over Internet (VoIP) calls for over four ...
green and brown tree branch on brown rock

How To Properly Delete a Certificate Authority

Securing communications via digital certificates is among the most secure processes used by organizations today. The use of public key cryptography makes certificates uncrackable and can be used to protect countless network ...
https://images.idgesg.net/images/article/2019/06/email-security_lock_breach_protocol_by-microstockhub-getty-100799018-large.jpg

The Best Private CA / PKI Service

The use of certificates for network security is rapidly increasing due to their superiority over all other authentication methods. They’re incredibly versatile and can enable authentication customization that far surpasses what is ...
5 Steps Towards Securing your Certificate Infrastructure

5 Steps Towards Securing your Certificate Infrastructure

Certificate Infrastructure or Public Key Infrastructure (PKI) plays an important role in enterprise security by using encryption to secure data transmission. Managing PKI is an important task for enterprise security teams, and ...
How to Auto-Enroll Certificates from AD CS

How to Auto-Enroll Certificates from AD CS

Active Directory Certificate Services (AD CS) is a Windows server software solution designed to issue x.509 digital certificates. Certificates have proven to be more secure and easier to use than passwords, and ...
EARN IT Act and How Encryption is Related to Freedom of Speech

EARN IT Act and How Encryption is Related to Freedom of Speech

Since the EARN IT Act was introduced in early March 2020, it was met with strong opposition by privacy groups and academia. The Act has been called “a disaster for Internet users’ ...
x.509 certificate management

SSH Certificates and their Real-World Applications

SSH Certificates and their Real-World Applications The ongoing pandemic has pushed many organizations to direct their employees to work from home, necessitating a switch to a public cloud infrastructure. Naturally, this raises ...
Cloud EKM providing bridge between KMS and External Key Manager

Deep Dive Into Google Cloud Key Management Services

Deep Dive Into Google Cloud Key Management Services In this article, we will take a closer look at Google’s Cloud Key Management Services. When users store data into Google Cloud, the data ...
x.509 certificate management

SSH Certificates and their Real-World Applications

The ongoing pandemic has pushed many organizations to direct their employees to work from home, necessitating a switch to a public cloud infrastructure. Naturally, this raises data security concerns, as companies worry ...
Cloud EKM providing bridge between KMS and External Key Manager

Deep Dive Into Google Cloud Key Management Services

In this article, we will take a closer look at Google’s Cloud Key Management Services. When users store data into Google Cloud, the data is automatically encrypted at rest. We use Google’s ...