key management
PKfail: 800+ Major PC Models have Insecure ‘Secure Boot’
Richi Jennings | | Binarly, BIOS, BIOS update, Certificate and Key Management, hardware supply chain, key management, Key Management Problem, PKfail, Private Key Management, SB Blogwatch, secure boot, UEFI, UEFI Failing, UEFI firmware, UEFI vulnerabilities, Unified Extensible Firmware Interface (UEFI)
Big BIOS bother: Hundreds of PC models from vendors such as HP, Lenovo, Dell, Intel, Acer and Gigabyte shipped with useless boot protection—using private keys that aren’t private ...
Security Boulevard
Guide to Digital Authentication: Human and Machine Identities
Accutive Security | | articles, CIAM, clm, digital authentication, iam, key management, Keyfactor, machine identity management, MIM, PKI, Secrets Management, thales, Venafi
As technology advances and the digital landscape becomes increasingly sophisticated, it makes our lives easier in some ways, but more difficult in others. Unfortunately, as our systems have advanced, the threat landscape ...
The Security Imperative: Data Protection
As cyberthreats to supply chain, infrastructure and operational technology (OT)—not to mention rogue activity sponsored by nation-states—continue to increase, there is one constant: Good data protection has never been more critical. Successful ...
Security Boulevard
Overcoming the Challenges of Enterprise Key Management
Let’s face it: Encryption key management can seem daunting. Sure, it’s easy to connect a hardware security module (HSM) to a database and generate a key, but that’s not how it works ...
Security Boulevard
Enterprise Data Encryption Use Reaches Historic Highs
For decades, enterprise data encryption and effective key management were something most enterprises wanted to do but couldn’t — if they tried to do it at all. Only the largest of enterprises ...
Security Boulevard
Securing SSH Keys in Multicloud Operations
Secure Shell, or SSH, keys have become a go-to authentication tool, especially as we continue to adopt and adapt to distributed IT and remote working environments that demand robust access controls. But ...
Security Boulevard
White-Box Encryption: Ending Web App Vulnerability
Key management must give way to new options that enable and protect true encryption for organizations For as long as they’ve existed, web applications have been a favorite target for hackers. They ...
Security Boulevard
Modernizing Your PKI Infrastructure | Keyfactor
Nina Ruhe | | cloud computing, cryptography, key management, PKI Cloud Security, Public Key Infrastructure (PKI)
Over the years, the definition, functionality, and team required to operate a modern PKI infrastructure has drastically changed ...
1 Billion Reasons to Manage Cryptographic Keys | Keyfactor
Postbank, the banking division of South Africa’s Pat Office, recently reported that a rogue employee had stolen the 36-digit master keys used to protect the banks systems. The result: 25,000 fraudulent charges ...
12 Enterprise Encryption Key Management Best Practices
From centralization to automation, here’s your 12-step guide to being more proactive with your enterprise’s encryption key management “What’s the first thing I need to protect data stored on our... The post ...