-
News Article Apr 11, 2024
Sectigo announced the newest member of its senior executive team with the appointment of Jason Scott as CISO.
Jason will oversee all aspects of cybersecurity at Sectigo including data, infrastructure, network, applications, and products. He joins the company with more than 20 years’ experience that includes leadership roles at top global organizations such as Capgemini, Chevron, and the US Army.
-
News Article Apr 11, 2024
Raspberry Robin, the highly adaptable and evasive worm and malware loader that first appeared on the cyberthreat scene in 2021, is now using a new method for spreading its malicious code.
According to a report this week by threat researchers with HP Wolf Security, a new campaign detected last month indicated that the operators behind Raspberry Robin are using malicious Windows Script Files (WSFs) to deliver their malware, a break from their more prevalent approach of using infected USB drives.
-
Podcast Apr 11, 2024
Root Causes 377: Is CPS/Issuance Misalignment a Revocation Event?
If you issue public certificates that are fully compliant except they don't reflect what your CPS says, are they misissued? Do they require revocation?
-
Blog Post Apr 09, 2024
Discover PKI and digital certificates' role in cybersecurity. Learn how PKI automation manages certificate complexity for enterprise growth.
-
Press Release Apr 09, 2024
SCOTTSDALE, Ariz., — April 09, 2024 — Sectigo®, the industry’s most innovative provider of comprehensive certificate lifecycle management (CLM), today announced the newest member of its senior executive team with the appointment of Jason Scott as chief information security officer (CISO).
-
Blog Post Apr 08, 2024
Rising complexities in access control and data protection drive adoption of Zero Trust and PKI. Learn how they bolster cybersecurity.
-
Podcast Apr 08, 2024
Root Causes 376: Gartner's New CLM Framework
Gartner has released a new framework for Certificate Lifecycle Management, called the Seven Core Functions of Certificate Automation.
-
Blog Post Apr 05, 2024
With increasing digitization, cybersecurity becomes paramount. Conducting a risk assessment and implementing strategies are key to reducing exposure.
-
Podcast Apr 05, 2024
Root Causes 375: What Is Name Space Lifecycle Management?
CNAMEs, SPF, DMARC, name server entries, and other DNS identifiers, left unattended, can expose companies to identity-based attacks.
-
News Article Apr 04, 2024
Prudential Financial last Friday commenced the process of informing over 36,000 individuals about a data breach that occurred in early February 2024.
The breach, initially disclosed through a regulatory filing with the SEC in February, occurred on February 4 and was reportedly identified the following day.
-
News Article Apr 04, 2024
Research from the Black Lotus Labs team at Lumen Technologies has identified multi-year efforts to target end-of-life (EoL) and IoT devices. Small home and small office routers are a particular target of this campaign, which is associated with an updated version of malware known as TheMoon.
-
News Article Apr 04, 2024
An embattled National Institute of Standards and Technology (NIST), hobbled by budget cuts, is looking for more help from both inside and outside the government. NIST is trying to manage a growing backlog of security vulnerabilities coming into the database it maintains.
The National Institute of Science and Technology, which manages the critical National Vulnerability Database (NVD), warned in February that it was falling behind in keeping up with the flow of flaws being submitted. At the time, it noted “an increase in software and, therefore, vulnerabilities, as well as a change in interagency support.”