-
Podcast Oct 04, 2024
Root Causes 428: .MOBI Attack Puts WHOIS-based DCV into Question
White hat researchers managed to take over WHOIS for the .mobi TLD, foretelling the death of WHOIS as an email source for Domain Control Validation (DCV).
-
News Article Oct 02, 2024
NIST has made some progress clearing its backlog of security vulnerability reports to process – though it's not quite on target as hoped. The US government standards body just blew its self-imposed September 30 deadline to bring the speed at which its National Vulnerability Database (NVD) processes new flaws up to its pre-February rate, following a decline in output this year.
-
Podcast Oct 02, 2024
Root Causes 427: Mapping CLM to NIST CSF 2.0
In this episode we map the contributions of Certificate Lifecycle Management into the new NIST Cybersecurity Framework 2.0.
-
Blog Post Oct 01, 2024
Automated CLM streamlines certificate management, reducing costs, minimizing outages, and boosting security, scalability, and compliance.
-
Webinar Oct 01, 2024
How mature is your Certificate Lifecycle Management?
The surge in certificate usage has reached unprecedented levels, with industry standards for certificate lifespans progressively shrinking.
-
News Article Oct 01, 2024
“Many government systems are 20 to 30 years old and lack modern features like strong authentication, encryption, and access controls. These gaps make them vulnerable to attacks. The fact that attackers can easily alter voter databases or access legal records shows the limits of relying on reactive measures like penetration testing.” - Jason Soroko, senior fellow at Sectigo.
-
News Article Sep 30, 2024
Network configuration, CA and SWIFT issues, and certificate expiration blamed for a series of RTGS outages the past year.
-
Podcast Sep 30, 2024
Root Causes 426: Expired Certificate Takes Down Bank of England
A certificate expiration is now known to have created July's outage of Bank of England. Join us as we shake our heads in amazement yet again.
-
Podcast Sep 27, 2024
Root Causes 425: PQC Requirements for Voting Systems
In honor of the upcoming US elections, we describe the six main requirements for a post-quantum voting system.
-
News Article Sep 26, 2024
A city in southern Kansas is responding to a cyberattack against its municipal water system, highlighting again the threat bad actors represent to such critical infrastructure in the United States.
-
News Article Sep 25, 2024
The G7 Cyber Expert Group (CEG) released a public statement Sept. 25 highlighting the potential cybersecurity risks to the financial sector from the expected advancements in quantum computing.
-
News Article Sep 25, 2024
Today, the G7 Cyber Expert Group (CEG), chaired by the U.S. Department of the Treasury and the Bank of England, issued a statement addressing the cybersecurity risks posed by quantum computing. While quantum advancements promise groundbreaking changes, they also threaten the security of current encryption standards widely used in financial systems.