What is Secure to Use? | Zoner & DigiCert Partner Case Study

“I feel that the current internet is almost 100 percent secured…but it does not mean it is secure to use.” – Jindrich Zechmeister, Director of IT Security at Zoner For the people at Zoner, authentication is as important as website security. That’s why they partnered with DigiCert. Thanks to PKI Platform, Zoner and their customers […]

New IDC Study Shows Growing Use of PKI for Enterprise Security

DigiCert-sponsored study finds PKI investments improve security and modernize business processes We’ve released new research by IDC showing that the number of businesses using PKI as part of their broader security programs, beyond TLS for websites, has more than doubled in the last decade, to 65% in 2018. The IDC Data Services for Hybrid Cloud […]

DigiCert on Quantum 4: NIST Second PQC Standardization Conference

DigiCert on Quantum 4: NIST Second PQC Standardization Conference In the last article, we discussed how to figure out when to start switching to post-quantum algorithms. In the next few articles, we will discuss the available post-quantum techniques and how to transition to them. The first step is discussing cryptographic primitives. These are the low-level […]

APWG Phishing Report: SaaS and Webmail Phishing Surpasses Financial Services

The Anti-Phishing Working Group’s (APWG) Phishing Activity Trends Report, 1st Quarter 2019, shows that, for the first time, phishing of Software-as-a-Service (SaaS) and webmail has surpassed phishing of payment services. SaaS and webmail were the most-targeted sector for phishing in Q1 2019, suffering 36 percent of phishing attacks (compared to 27 percent for payment services). […]

Posted in PKI

How to Improve your Organization’s Crypto-Agility

As the sheer number of connected devices continues to rise and technology continues to develop toward a future full of quantum computers, securing devices/applications and becoming “crypto agile” is fundamental to an organization’s effort to become and stay secure, today and in the future. Read on to discover how to improve your organization’s crypto-agility. A […]

For IBM, identity has become the new perimeter defense.

“The landscape has shifted under our feet. With the rapid adoption of Software as a Service, all the beautiful protections provided by on-premises network security are totally bypassed.” — Weber Yuan, Ph.D, Lead Architect, CIO, Identity Services & Information Security, IBM In the new digital landscape, Software as a Service models are disrupting the traditional […]

Planning for Japan IoT Security Regulation Changes in 2020

A recent article published by Nikkei in Japan today reported that the security risks posed by Internet of Things (IoT) devices is rising, and that the Ministry of Internal Affairs and Communications will be considering regulations beginning in 2020 to enforce standards. The regulations they are considering include mandating that all devices have identity, that […]

How to Secure Internet-Connected Devices in the Hospitality Industry

In mid-February, I participated on a panel focused on securing Internet of Things (IoT) devices in the hospitality industry. This event was sponsored by CLM (Claims and Litigation Management). Have you ever thought about how IoT devices are used in the hospitality industry?  They are used in hotels much like their use in smart homes. Think […]

Connected Cars Need a Security Solution: Use PKI

Roughly a quarter billion connected cars will be on our roads by 2020. That’s only two years away and we’re well on our way with 21 million connected cars out there. Already so many of our cars have fascinating features that allow us to get live updates to sports games, traffic, and social media while […]