![terminal](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194342/terminal1-400x200.jpg)
Half of organizations do not audit SSH entitlements
Cybercriminals, such as malicious insiders, use SSH keys to access systems from remote locations, evade security tools and escalate privileges, according to a study conducted …
![certificate](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105147/certificate-400x200.jpg)
How much do criminals pay for certificates on the dark web?
The Cyber Security Research Institute (CSRI) conducted a six-month investigation into the sale of digital code signing certificates on the dark web. The research uncovered …
![Terminal](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102852/terminal-keys-400x200.jpg)
Most organizations don’t have SSH security policies in place
Cybercriminals can abuse SSH keys to secure and automate administrator-to-machine and machine-to-machine access to critical business functions. According to Venafi’s research, …
![tunnel light](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111058/tunnel-light-400x200.jpg)
How attackers can take advantage of encrypted tunnels
Many organizations are not actively examining the encrypted traffic in their network. According to a Venafi survey, roughly a quarter (23%) of security professionals don’t …
![vote](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111919/vote-400x200.jpg)
Most infosec pros believe election hacks are acts of cyber war
IT security professionals believe the effects of cyber attacks on elections go beyond diminishing confidence in the democratic process, according to a Venafi survey of 296 IT …
![door](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105503/door-400x200.jpg)
How security pros look at encryption backdoors
The majority of IT security professionals believe encryption backdoors are ineffective and potentially dangerous, with 91 percent saying cybercriminals could take advantage of …
![open lock](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113144/open_lock-400x200.jpg)
Weak DevOps cryptographic policies increase financial services cyber risk
Cryptographic security risks are amplified in DevOps settings, where compromises in development or test environments can spread to production systems and applications. This is …
![puzzle](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110326/puzzle-400x200.jpg)
Cryptographic security risks are amplified in DevOps settings
Cryptographic security risks are amplified in DevOps settings, where compromises in development or test environments can spread to production systems and applications, …
![numbers](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113233/numbers-400x200.jpg)
23% of security pros are blind to encrypted traffic threats
According to a Venafi survey conducted at RSA Conference 2017, 23 percent of respondents have no idea how much of their encrypted traffic is decrypted and inspected. …
![open lock](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113144/open_lock-400x200.jpg)
21% of websites still use insecure SHA-1 certificates
New research from Venafi Labs shows that 21 percent of the world’s websites are still using certificates signed with the vulnerable Secure Hash Algorithm, SHA-1. On February …
![encryption data](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09113952/encryptiondata-400x200.jpg)
Global geopolitical changes driving encryption adoption
Recent global geopolitical changes have made more people and organizations than ever worry about the privacy of their data, and consider increasing their use of encryption to …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD