searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Videos
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Product showcase
  • Newsletters

Venafi

Get our top stories in your inbox

New infosec products of the week: January 27, 2023

January 27, 2023

Here’s a look at the most interesting products from the past week, featuring releases from Perimeter 81, SpyCloud, ThreatConnect, Venafi, and Wallarm. SpyCloud Compass …

Venafi TLS Protect for Kubernetes simplifies machine identity management

January 25, 2023

As part of the Venafi Control Plane for machine identities, TLS Protect for Kubernetes enables security and platform teams to easily and securely manage cloud native machine …

ISARA makes four digital certificate patents publicly available to boost quantum security

October 26, 2022

ISARA revealed that it is dedicating the intellectual property behind its ISARA Catalyst Agile Digital Certificate Methodology — including four patents — to the public. …

cert-manager: Automatically provision and manage TLS certificates in Kubernetes

October 24, 2022

cert-manager adds certificates and certificate issuers as resource types in Kubernetes clusters and simplifies the process of obtaining, renewing, and using those …

Venafi Control Plane for Machine Identities enables users to reduce security risk

October 13, 2022

Venafi unveiled the Venafi Control Plane for Machine Identities, unifying machine identity management across all identity types: in data centers, cloud, hybrid environments …

Use of machine identities is growing in state-sponsored cyberattacks

September 5, 2022

66% of organizations have changed their cybersecurity strategy as a direct response to the conflict between Russia and Ukraine, while 64% suspect their organization has been …

Organizations changing cyber strategy in response to nation-state attacks

August 25, 2022

66% of organizations have changed their cybersecurity strategy as a direct response to the conflict between Russia and Ukraine, while 64% suspect their organization has been …

87% of the ransomware found on the dark web has been delivered via malicious macros

August 3, 2022

Venafi announced the findings of a dark web investigation into ransomware spread via malicious macros. Conducted in partnership with criminal intelligence provider Forensic …

Now is the time to focus on software supply chain security improvements

August 1, 2022

The shift to cloud-native development, along with the increased speed in development brought about by the adoption of DevOps processes, has made the challenges connected with …

Evaluating the use of encryption across the world’s top one million sites

June 30, 2022

A new report from security researcher and TLS expert Scott Helme, evaluates the use of encryption across the world’s top one million sites over the last six months and reveals …

82% of CIOs believe their software supply chains are vulnerable

June 8, 2022

The shift to cloud native development, along with the increased speed in development brought about by the adoption of DevOps processes, has made the challenges connected with …

Boards, CEOs demand software supply chain security improvements

June 7, 2022

Venafi announced the findings of a global study of 1,000 CIOs, in which 82% say their organizations are vulnerable to cyberattacks targeting software supply chains. The shift …

Posts navigation

1 2 3 4 5 6

Featured news

  • Top ways attackers are targeting your endpoints
  • Why organizations shouldn’t fold to cybercriminal requests
  • Fake ChatGPT for Google extension hijacks Facebook accounts
How to protect online privacy in the age of pixel trackers

Sponsored

Webinar: Tips from MSSPs to MSSPs – starting a vCISO practice

Security in the cloud with more automation

CISOs struggle with stress and limited resources

How to scale cybersecurity for your business

Don't miss

Top ways attackers are targeting your endpoints

Why organizations shouldn’t fold to cybercriminal requests

Fake ChatGPT for Google extension hijacks Facebook accounts

A common user mistake can lead to compromised Okta login credentials

A closer look at TSA’s new cybersecurity requirements for aviation

Cybersecurity news
Help Net Security - Daily information security news with a focus on enterprise security.
© Copyright 1998-2023 by Help Net Security
Read our privacy policy | About us | Advertise
Follow us