APWG Phishing Report: SaaS and Webmail Phishing Surpasses Financial Services

The Anti-Phishing Working Group’s (APWG) Phishing Activity Trends Report, 1st Quarter 2019, shows that, for the first time, phishing of Software-as-a-Service (SaaS) and webmail has surpassed phishing of payment services. SaaS and webmail were the most-targeted sector for phishing in Q1 2019, suffering 36 percent of phishing attacks (compared to 27 percent for payment services). […]

Posted in PKI

How to Improve your Organization’s Crypto-Agility

As the sheer number of connected devices continues to rise and technology continues to develop toward a future full of quantum computers, securing devices/applications and becoming “crypto agile” is fundamental to an organization’s effort to become and stay secure, today and in the future. Read on to discover how to improve your organization’s crypto-agility. A […]

For IBM, identity has become the new perimeter defense.

“The landscape has shifted under our feet. With the rapid adoption of Software as a Service, all the beautiful protections provided by on-premises network security are totally bypassed.” — Weber Yuan, Ph.D, Lead Architect, CIO, Identity Services & Information Security, IBM In the new digital landscape, Software as a Service models are disrupting the traditional […]

Planning for Japan IoT Security Regulation Changes in 2020

A recent article published by Nikkei in Japan today reported that the security risks posed by Internet of Things (IoT) devices is rising, and that the Ministry of Internal Affairs and Communications will be considering regulations beginning in 2020 to enforce standards. The regulations they are considering include mandating that all devices have identity, that […]

How to Secure Internet-Connected Devices in the Hospitality Industry

In mid-February, I participated on a panel focused on securing Internet of Things (IoT) devices in the hospitality industry. This event was sponsored by CLM (Claims and Litigation Management). Have you ever thought about how IoT devices are used in the hospitality industry?  They are used in hotels much like their use in smart homes. Think […]

Connected Cars Need a Security Solution: Use PKI

Roughly a quarter billion connected cars will be on our roads by 2020. That’s only two years away and we’re well on our way with 21 million connected cars out there. Already so many of our cars have fascinating features that allow us to get live updates to sports games, traffic, and social media while […]

Mitigating Risk: The Importance of Considering Your Certificate Practices

Your overall device and network security is related to your PKI design and certificate policy. Just as you’d build your house with an earthquake-resistant foundation, or ensure your roof can withstand a hurricane, you should design and deploy your PKI to resist common threats. Many of these decisions need to be made upfront, when you’re […]

How to Build a PKI That Scales: Hosted vs. Internal [SME Interview]

In our previous interview with Darin Andrew, Senior PKI Architect at DigiCert, we discussed the differences between public and private PKI. We established that most enterprises use a hybrid PKI solution. That said, you have two options for implementing your private PKI: (1) use a hosted solution from a certificate authority (CA) or (2) build […]