Please turn on your JavaScript for this page to function normally.
shop online
Explosion of look-alike domains aims to steal sensitive data from online shoppers

Venafi released research on the explosion of look-alike domains, which are routinely used to steal sensitive data from online shoppers. Venafi’s research analyzed suspicious …

brain
80% of enterprises struggle to protect machine identities

Ninety-six percent of companies believe that effective protection of machine and human identities are equally important to the long-term security and viability of their …

vote
Election systems should be considered critical infrastructure

93 percent of security professionals are concerned about cyber-attacks targeting election infrastructure and data, and 81 percent believe cyber criminals will target election …

Venafi Enterprise Mobility Protect delivers visibility and machine identity on mobile endpoints

Venafi announced Venafi Enterprise Mobility Protect, a solution that safeguards the machine identities used on endpoints that access enterprise networks and resources. Venafi …

locks
Personal encryption usage is increasing

According to a Venafi survey of 512 security professionals attending RSA Conference 2018, sixty-four percent of respondents say their personal encryption usage has increased …

data
Should governments regulate social media data collection?

Venafi announced the results of a survey querying 512 security professionals attending RSA Conference 2018. The survey evaluated opinions on the intersection of cyber …

doctor
Most healthcare pros believe their organizations adequately protect patient data

Most of the healthcare professionals polled remain confident regarding their own organization’s cyber security protocols despite apprehensions connected with their own …

reddit bad
Realistic, well-positioned Reddit clone is out to grab users’ login credentials

A convincing clone of the popular social news aggregation and discussion site Reddit has been spotted on the reddit.co domain. The author is obviously counting on users not to …

Will explosive data exfiltration continue in 2018?

Last year was a banner year for cybercrime. More data was stolen in the first six months of 2017 than in the entirety of 2016. Gemalto’s Breach Level Index found that over 900 …

terminal
Half of organizations do not audit SSH entitlements

Cybercriminals, such as malicious insiders, use SSH keys to access systems from remote locations, evade security tools and escalate privileges, according to a study conducted …

certificate
How much do criminals pay for certificates on the dark web?

The Cyber Security Research Institute (CSRI) conducted a six-month investigation into the sale of digital code signing certificates on the dark web. The research uncovered …

Terminal
Most organizations don’t have SSH security policies in place

Cybercriminals can abuse SSH keys to secure and automate administrator-to-machine and machine-to-machine access to critical business functions. According to Venafi’s research, …

Don't miss

Cybersecurity news