Don’t Let an Expired Certificate Cause Critical Downtime. Prevent Outages with a Smart CLM

If there’s one thing Microsoft, Spotify, Google Voice, and the Bank of England have in common, what would it be? All of them have recently been rocked by a major outage caused ...

Key Takeaways from the 2024 ESG Report on Non-Human Identity (NHI) Management

For years, Identity and Access Management (IAM) has centered on human identities, built on the assumption that people are the weakest link in the cybersecurity chain. However, the digital landscape has shifted ...
The Deepfake Headache: Are PKI & Digital Signatures the Panacea?

The Deepfake Headache: Are PKI & Digital Signatures the Panacea?

While the world still debates the benefits of AI (Artificial Intelligence) and its application across all realms of life, little is debated on the flipside of AI, especially in the context of ...
Lessons Learned from Compromised Digital Certificates-1 (1)

Lessons Learned From Compromised Digital Certificate Incidents

Digital certificates play a pivotal role in ensuring trust, encryption and secure communications and transactions. However, even slight lapses in certificate management can have severe consequences, as demonstrated by several high-profile breaches ...
PKI Assessment logo

Rebuilding Public Key Infrastructure | Why are 98% of organizations unhappy with their PKI?

Keyfactor’s annual PKI & Digital Trust Report for 2024 contained a bombshell finding – 98% of organizations indicated that they would rebuild their public key infrastructure (PKI) if they could start over ...
The NIS2 Compliance Deadline Is Nearing. Are You Prepared?

The NIS2 Compliance Deadline Is Nearing. Are You Prepared?

The hard deadline for NIS2 compliance in the EU is approaching rapidly on October 18, 2024. As organizations operating in the EU switch gears assessing their compliance readiness, here’s a quick overview ...
Why CISOs Need to Prioritize Quantum Readiness Now

Why CISOs Need To Act On Quantum-Readiness Now

In 1994, when mathematician Peter Shor first introduced the quantum algorithm, now famously known as Shor’s algorithm, many found the concept of quantum computers wild and unreal. Fast forward to 2024, the ...
Strengthening Medical Device Security With PKI

Strengthening Medical Device Security With PKI

In the fast-evolving world of healthcare, connected medical devices are revolutionizing diagnostics and patient care. From pacemakers and glucose monitors to advanced imaging systems and smart wearables, these connected medical devices (IoMT ...
Infoblox certificates Datadog Web3 DNSSEC OPSWAT web application security

Digital Certificates Riddled With Security Weaknesses

A study published today found 79% of certificates on the internet are vulnerable to man-in-the-middle (MitM) attacks, with as many as 10% expired or self-signed (15%) in a way that is considered ...
Security Boulevard
EMA report

New EMA Research Report Spotlights SSL/TLS Certificate Management Challenges

Digital certificates are essential for enabling trust and protecting online transactions and communications. They are employed to guard against many forms of cyberattacks, authenticate users, and encrypt sensitive data. However, because digital ...