Goto

Collaborating Authors

Automation is the Future of (Digital Certificate) Security

#artificialintelligence

As a foundational security technology that's been implemented for decades, public key infrastructure (PKI) is already deployed in most enterprise IT infrastructures to protect network devices, workforce and internet of things (IoT) devices for a variety of use cases such as passwordless authentication, data encryption and digital signing. However, the ongoing management and maintenance of an in-house PKI deployment can be difficult and requires dedicated, skilled staff--adding to overall security costs. An on demand PKI-as-a-service (PKIaaS) solution can significantly reduce those costs and risks, allowing enterprises to scale on demand. Digital transformation and the explosion of IoT devices have increased the number of internet-connected devices across the enterprise. On top of that, the lifespan of digital certificates to secure websites, networks and devices has shortened significantly, and managing those digital certificates manually is error-prone and creates excess overhead for IT and security teams.


Let's Encrypt explains last month's outages caused by certificate expiration

ZDNet

Dozens of websites and services reported issues late last month thanks to the expiration of a root certificate provided by Let's Encrypt, one of the largest providers of HTTPS certificates. Let's Encrypt and other researchers had long warned that the IdentTrust DST Root CA X3 would expire on September 30, and many platforms did heed the calls and updated their systems. But a few did not, causing a minor kerfuffle as users questioned why some of their favorite sites were not working as well as they should. Scott Helme, the founder of Security Headers, told ZDNet that he confirmed issues with Palo Alto, Bluecoat, Cisco Umbrella, Catchpoint, Guardian Firewall, Monday.com, PFsense, Google Cloud Monitoring, Azure Application Gateway, OVH, Auth0, Shopify, Xero, QuickBooks, Fortinet, Heroku, Rocket League, InstaPage, Ledger, Netlify and Cloudflare pages, but noted that there may have been more that went unreported.


Manual certificate management falling way behind PKI growth

ZDNet

Public key infrastructure (PKI) is a system of processes, technologies, and policies for encrypting and signing data. It plays an essential role in authenticating users, servers, devices, software, and digital documents. Yet enterprises are struggling with the growing number of PKI certificates they must manage, and many are considering PKI automation to address this problem, according to a new DigiCert report. The report, "State of PKI Automation 2021," explores how organizations are handling the challenge of PKI certificate management. Expired certificates are a problem because they disable encryption and create an attack surface for hackers.


We need to talk about metaverse security - Information Age

#artificialintelligence

Every day there is news regarding the metaverse. Some firms are raising millions to bring luxury fashion to the metaverse, while celebrities are buying plots of premium land, and the rest wonder what their actual role will be in the sphere. In time, the potential of the metaverse is limitless. But at the same time, questions, confusion, and a sense of unease abound in these stories. Mark Zuckerberg claims humans will'live in the metaverse'; perhaps, but there will be many barriers to adoption.


Keys to securing the Internet of Things

#artificialintelligence

A recent observation that Chevron Corp. CIO Bill Braun made about his company's use of Internet of Things (IoT) devices encapsulates how it has become a primary source of invaluable business information. "The IoT area is probably one of the fastest growing data types we have in the company," Braun told the Wall Street Journal. "You can't buy a motor or a valve now that doesn't come with four or eight sensors on them, even if you don't want them." As the number of IoT devices enterprises deploy continues to grow, so too does the risk of a data breach. Mitigating that risk requires manufacturers to adopt a "secure by default" approach to the design process.