Venafi

Cybersecurity Pros Believe They Should Have The Right To ‘Hack Back’

At the recent RAS Conference in San Francisco several discussions took place around the topic of cyberattacks from nation state…

Yorkshire Council Application Accessed By Hacker of Unknown Hat

A hacker has accessed the data belonging to nearly 6,000 Yorkshire residents, by breaching a Yorkshire Council application. The One…

Stolen Code-Signing Certificate Used in Malware Attack

A new malware campaign that misuses a stolen digital certificate has been identified security researchers at ESET. They found that…

Goodbye Green Lock on Web Addresses

There will be no more green locks to advise Chrome users that web pages they are using are secure, as…

Unmasking the machine identity monster

Machine identity is when authentication is applied to network entities that are not human, a concept becoming increasingly common in…

SSH: Security asset or security liability?

EB: What is SSH? CD: In short, SSH, or Secure Shell, provides secure access to remote computers over an otherwise…

Attack of the Clones – can you trust your machines?

There is a common scenario beloved by many sci-fi films and programmes; a spaceship crew lands on some new planet…

Digital Certificates: Why companies need to take control and adopt automation

EB: Before we dig a little deeper, what exactly is a digital certificate? TM: Digital certificates function like user names and…

Venafi CEO: Creating trust in the machine

As the IoT crisis intensifies, we are faced by an explosion of the machine population, and what goes unnoticed and…

SHA-1 Migration: Are We There Yet?

We all tend to feel uneasy when our web browser issues a security warning. You certainly don’t want your organizations’…