These security predictions are based on industry standards initiatives, represented by organizations involved in the industry, thought leaders, and other stake holders in the security market. While it is fairly safe to predict that some security areas will see improvement in the coming year, others will become more problematic. It is these areas of continuing […]
“People need to think about how they’re securing not just browser traffic, but also API and automated traffic.” – Patrick Donahue, Director of Product Management, Cloudflare Just when you thought you had encryption figured out, Cloudflare reveals three new ways to employ it for a better internet. Cloudflare is determined to help save the internet. […]
Thousands of connected devices use default settings, making them vulnerable to attack. You may not think much of this when you’re hurrying to set up a new router without customizing the network or password—after all, we just want to start using our new gadgets. But imagine what happens when hundreds of these internet-connected devices, including […]
In our fourth and final interview on building a scalable PKI, we ask Darin how we should automate certificate management. But first, let’s recap the series up to this point: We started by giving you a high-level overview of some of the critical PKI use cases. We then delved into the difference between public and […]
Every company is looking for ways to speed up development while incorporating the appropriate level of security. Organizations are successfully doing this by taking a DevOps approach, which increases agility in many areas namely security, IT, and development. But this accomplishment doesn’t come without challenges. For some, deciding to take this new approach comes with […]
APIs combined with cloud-based certificate management and deployment services make certificate lifecycle management in the enterprise network easy.