Please turn on your JavaScript for this page to function normally.
IoT security
Where should companies start when it comes to device security?

The Internet of Things (IoT) market has a security problem that is boiling over into a business issue. According to a recent survey conducted by the Ponemon Institute, 59% of …

certificate
Lack of CLM maturity is putting organizations at risk

More than a year after the historic and damaging SolarWinds attack, nearly 65% of organizations still are unable to secure and govern the growing volume of machine and …

DevOps
Securing DevOps amid digital transformation

There are always new buzzwords/phrases being bandied about. In the late 1990s it was “long tail of the Internet” and “new paradigms”. Then there was this new thing referred to …

IoT
IoT security is foundational, not optional

A PSA Certified report predicts that this year will mark a turning point in securing the Internet of Things (IoT), as the industry collectively commits to addressing the …

David Mahdi
When protecting and managing digital identities, orchestration and automation are critical

In this interview with Help Net Security, David Mahdi, CSO of Sectigo, talks about the importance of digital identity management, the issues organizations have with digital …

certificate
Enterprise PKI automation: The modern approach to certificate lifecycle management

Today’s modern enterprises face massive surges in the use of digital identities, both for machines, (servers, laptops and network devices) and for the humans who use them. In …

shield
EV certificate usage declining: Is the internet becoming more secure?

Driven by the acceleration of digital transformation and cloud migration during the pandemic, the analysis of the world’s top 1 million sites over the last 18 months shows …

tunnel
Researchers shed light on hidden root CAs

How widespread is the use of hidden root CAs and certificates signed by them? To answer that and other questions, a group of researchers from several Chinese and U.S. …

PKI
Lack of resources and skills continues to challenge PKI deployment

Driven by organizational changes, enterprise use of Public Key Infrastructure (PKI) and digital certificates has never been higher, while the related skills to manage PKI are …

danger
The dangers behind wildcard certificates: What enterprises need to know

With the National Security Agency recently issuing guidance on the risks associated with wildcard TLS certificates and Application Layer Protocols Allowing Cross-Protocol …

Renata Mekovec
(ISC)² goes to school: CISSP preparation and training as part of a specialist study

In this interview with Help Net Security, Renata Mekovec, Associate Professor and Head of the postgraduate specialist study Information Systems Security Management and …

certificate
Certificates volume growing, most enterprises considering PKI automation to reduce risks

The typical enterprise manages over 50,000 publicly and privately trusted PKI certificates, a DigiCert survey shows. Manually managing this volume of certificates can lead to …

Don't miss

Cybersecurity news