Search

Showing 109 results for: "Public+Key+Infrastructure".

Hidden flaws exist in millions of RSA digital certificates
Millions of the cryptographic digital certificates that secure internet communications and software updates have serious flaws that can be exploited, a presentation at the Keyfactor Tech Days conference in Miami last week demonstrated. "You stand up a web server, your customers come to you, a li...
You need to prepare for post-quantum cryptography now. Here's why
At last week's Keyfactor Tech Days conference in Miami Beach, the predominant theme was post-quantum cryptography and how to go about achieving it. Two panel discussions and several smaller talks dealt with the issue, and their common consensus was: We're in trouble. Why so? Because fast, reliab...
Verifying the mix: How to handle software-supply-chain security
Signing code with secure digital certificates has become supremely important for software development as supply-chain attacks mount and governments worldwide create new tech-safety regulations. This is especially true for Internet of Things and operational technology (OT) devices, several speake...
Keyfactor Tech Days: Catching up to the future
The dominant topic at Keyfactor's Tech Days conference earlier this week (March 4-5) in Miami Beach was post-quantum cryptography, with nearly half the talks we attended at the two-day event touching upon the issue. We'll have a deeper dive into post-quantum cryptography in a follow-up piece. Bu...
Identity management solutions for the next generation of cybersecurity
Identity threats are a ubiquitous and ever-evolving challenge for cybersecurity professionals. Nearly every organization, 93%, faced two or more identity-related breaches in 2024 according to CyberArk. Threat actors are finding craftier social engineering and exploit methods to take over acco...
CisoHive's Renee Guttmann: A female CISO who sings her own song  
It was never in the original plan for Renee Guttmann to pursue a career in cybersecurity. The CISO Emeritus and founder of CisoHive, Guttmann’s first love was singing. She wanted her parents to pay for voice lessons, but learned the accordion instead, mainly because her parents came from Austri...
Fortanix and Sectigo partner to automate software supply chain security
Fortanix and Sectigo have announced a partnership that looks to improve software supply chain security through automated code-signing certificate issuance, according to SiliconAngle. The collaboration offers enterprises a scalable solution that integrates automated public key infrastructure and ...
New federal internet routing security guidance unveiled
Mounting cybersecurity threats against the Border Gateway Protocol for internet data routing have prompted the Office of the National Cyber Director to issue a new roadmap urging the implementation of Resource Public Key Infrastructure to mitigate the protocol's vulnerabilities, reports&n...
New internet routing security rules proposed by FCC
Increasing security risks associated with the Border Gateway Protocol used for internet routing — including cyberespionage, data theft, and critical infrastructure disruption — has prompted the Federal Communications Commission to propose new rules that would mandate the development and updating of...

You can skip this ad in 5 seconds