public key encryption

How Does Public Key Encryption Work?

We are living in a time where wireless security is imperative because private data and personal information are uploaded online. As the amount of online data increases, so does the monetary cost ...
A graphic illustration of how PKI works

Your Guide to How PKI Works & Secures Your Organization

Public key infrastructure secures everything from the login credentials in your browser to the sensitive data you share via email — here’s how PKI works. The post Your Guide to How PKI ...
Detecting GnuTLS CVE-2020-13777 using Zeek

Detecting GnuTLS CVE-2020-13777 using Zeek

By Johanna Amann, Software Engineer, Corelight CVE-2020-13777 is a high severity issue in GnuTLS. In a nutshell, GnuTLS versions between 3.6.4 (released 2018-09-24) and 3.6.14 (2020-06-03) have a serious bug in their ...
5 Actionable Takeaways from Ponemon and KeyFactor’s 2020 PKI Study

5 Actionable Takeaways from Ponemon and KeyFactor’s 2020 PKI Study

Looking for the latest stats and info about public key infrastructure? Look no further 74%. That’s how many organizations report not knowing how many keys and certificates they have. This... The post ...