-
Blog Post Sep 17, 2024
Expired SSL certificates risk security, downtime, lost trust, and financial loss; strong renewal processes are essential.
-
News Article Sep 17, 2024
A full 80% of organizations within the critical infrastructure vertical experienced email-related security breaches in the past year, according to an OPSWAT survey.
-
Product Video Sep 17, 2024
How-To SCM: Order SSL certificates with Azure Key Vault
In this video, we will provide you with a comprehensive explanation of the process for ordering SSL/TLS certificates with Azure Key Vault.
-
News Article Sep 16, 2024
RansomHub over the weekend reportedly released 487 gigabytes of Kawasaki Motors Europe (KME) data to the public internet in a case that has U.S. security pros concerned because of RansomHub’s prolific activity of late worldwide.
-
News Article Sep 16, 2024
The vulnerability was found in the cryptographic library of Infineon Technologies, which was used in older versions of Yubico devices.
-
Podcast Sep 16, 2024
Root Causes 421: FIDO 2 Implementation Problems
White hat researchers have raised concerns about FIDO 2 (AKA WebAuthn). We explain.
-
News Article Sep 13, 2024
Progress Software patched a critical 10.0 vulnerability that affects all LoadMaster releases, as well as the LoadMaster Multi-Tenant hypervisor.
-
Blog Post Sep 13, 2024
Automated CLM simplifies SSL/TLS management. Sectigo's CLM maturity model helps businesses automate and secure digital certificates effectively.
-
Podcast Sep 13, 2024
Root Causes 420: New Side Channel Attack Against YubiKeys
EUCLEAK, a newly revealed side-channel vulnerability, can clone the contents of a YubiKey. We talk about the attack and its significance.
-
News Article Sep 12, 2024
Progress Software issued an emergency fix to deal with a vulnerability impacting its its LoadMaster and LoadMaster Multi-Tenant (MT) Hypervisor products. This issue, called CVE-2024-7591, is considered a maximum severity vulnerability. The vulnerability is an improper input validation issue, which could allow unauthenticated, remote attackers to gain access to LoadMaster’s management interface.
-
News Article Sep 11, 2024
Generative Artificial Intelligence and its blend with deepfake technology has affected voice, image and video. What protections can be put in place?
-
Press Release Sep 11, 2024