digital certificates
Don’t Let an Expired Certificate Cause Critical Downtime. Prevent Outages with a Smart CLM
Krupa Patil | | certificate authorities, certificate lifecycle management, Certificate Outages, Certificate Signing Request, CLM tools, digital certificates, expired certificate, machine identity management, Smart CLM, TLS certificate
If there’s one thing Microsoft, Spotify, Google Voice, and the Bank of England have in common, what would it be? All of them have recently been rocked by a major outage caused ...
Key Takeaways from the 2024 ESG Report on Non-Human Identity (NHI) Management
Krupa Patil | | certificate lifecycle management, compliance risk, digital certificates, Identity-First Security, NHI management, non-human identities (NHIs), zero trust
For years, Identity and Access Management (IAM) has centered on human identities, built on the assumption that people are the weakest link in the cybersecurity chain. However, the digital landscape has shifted ...
The Deepfake Headache: Are PKI & Digital Signatures the Panacea?
Karthik Kannan | | certificate authority, deepfake AI, digital certificates, Digital Identity, digital signatures, PKI
While the world still debates the benefits of AI (Artificial Intelligence) and its application across all realms of life, little is debated on the flipside of AI, especially in the context of ...
Lessons Learned From Compromised Digital Certificate Incidents
Anandhi Venkataraman | | Certificate Discovery, certificate lifecycle management solutions, Certificate Management, Certificate Monitoring, Certificate Outage, certificate renewal, digital certificates, PKI
Digital certificates play a pivotal role in ensuring trust, encryption and secure communications and transactions. However, even slight lapses in certificate management can have severe consequences, as demonstrated by several high-profile breaches ...
Rebuilding Public Key Infrastructure | Why are 98% of organizations unhappy with their PKI?
Keval Varia | | articles, certificate lifecycle management, digital certificates, PKI, public-key infrastructure
Keyfactor’s annual PKI & Digital Trust Report for 2024 contained a bombshell finding – 98% of organizations indicated that they would rebuild their public key infrastructure (PKI) if they could start over ...
The NIS2 Compliance Deadline Is Nearing. Are You Prepared?
Krupa Patil | | certificate lifecycle management, Certificate Management, cryptography, digital certificates, Kubernetes, NIS2 Directive, PKI
The hard deadline for NIS2 compliance in the EU is approaching rapidly on October 18, 2024. As organizations operating in the EU switch gears assessing their compliance readiness, here’s a quick overview ...
Why CISOs Need To Act On Quantum-Readiness Now
Krupa Patil | | Certificate Management, digital certificates, Post-Quantum Cryptography, PQC, PQC algorithms, quantum computing
In 1994, when mathematician Peter Shor first introduced the quantum algorithm, now famously known as Shor’s algorithm, many found the concept of quantum computers wild and unreal. Fast forward to 2024, the ...
Strengthening Medical Device Security With PKI
Krupa Patil | | certificate lifecycle management, digital certificates, IoMT security, PKI, PKI certificates
In the fast-evolving world of healthcare, connected medical devices are revolutionizing diagnostics and patient care. From pacemakers and glucose monitors to advanced imaging systems and smart wearables, these connected medical devices (IoMT ...
Digital Certificates Riddled With Security Weaknesses
A study published today found 79% of certificates on the internet are vulnerable to man-in-the-middle (MitM) attacks, with as many as 10% expired or self-signed (15%) in a way that is considered ...
Security Boulevard
New EMA Research Report Spotlights SSL/TLS Certificate Management Challenges
Debarati Biswas | | Certificate expiry, Certificate Management, certificate management solution, cyberattacks, digital certificates, SSL/TLS Certificate Management, vulnerability
Digital certificates are essential for enabling trust and protecting online transactions and communications. They are employed to guard against many forms of cyberattacks, authenticate users, and encrypt sensitive data. However, because digital ...