Certificate based authentication News
September 22, 2015
Symantec testers created unauthorized Extended Validation certificates, but the bad certificates were caught by the Certificate Transparency log.
September 09, 2015
A survey of IT professionals at the Black Hat conference shows that understanding of certificate authorities is low, and Venafi believes this could lead to cybersecurity risks.
August 12, 2015
The Darkhotel advanced persistent threat group used an Adobe Flash zero-day vulnerability from the Hacking Team data leak, according to Kaspersky research.
June 05, 2015
News roundup: New settings and options to boost user privacy and security are emerging on major websites, but is it enough?
Certificate based authentication Get Started
Bring yourself up to speed with our introductory content
Let's Encrypt is designed to simplify the acquisition of SSL/TLS digital certificates proving a site’s authenticity, while also providing encryption. Its automated processes will also help reduce page errors due to out of date certificates. Continue Reading
Public key pinning aims to reduce the lack of trust associated with digital certificates and certificate authorities. Expert Michael Cobb explains how it works and its benefits. Continue Reading
In this CISSP Essentials Security School video presentation, Shon Harris discusses two core tenants of the cryptography domain: public key infrastructure and the use of digital certificates. Continue Reading
Evaluate Certificate based authentication Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Transport Layer Security (TLS) and Secure Sockets Layer (SSL) cryptographic protocols have long been the cornerstone of Web application security, and the whole process finds its root (quite literally) in a system of signed certificates. The trouble is this security system has turned into a vulnerability. Too often an enterprise possesses a hodgepodge of signed certificates from various Certificate Authorities (CAs) that are thrown into the directories of protected services, and then often forgotten until they expire. Worse yet, recently hackers have managed to create fake certificates. CAs -- once a seemingly effective answer to ensuring Web security -- are now providing an attack surface for hackers to take advantage of.
This technical guide surveys the CA landscape, opening with a field report on the latest CA security issue, the problem of fake certificates. To help explain the nature of this threat, our second chapter delves into the certificate system, current problems with it, and what enterprise IT staff can do. This guide’s closing chapter examines industry efforts to cope with the threat: TLS 1.3. Through this guide, IT professionals, and especially those concerned with network security, will learn the latest about TLS/SSL security. Continue Reading
Cross-signed certificates are causing Android devices to crash, and it's not the first time there's been a problem. Learn more about this issue and its potential security risks. Continue Reading
Ubiquitous global email is right around the corner. But what effect will it have on enterprises? Expert Michael Cobb explains. Continue Reading
Manage Certificate based authentication
Learn to apply best practices and optimize your operations.
With AirWatch by VMware, IT can manage Office365 applications on users’ mobile devices – all the while making sure those apps are secure. Continue Reading
Virtual desktops don't always trust certain security certificates, especially when applications are accessed through the Web. Continue Reading
Take the sting out of an Exchange 2013 migration by following these 12 steps for training, installation, verification and more. Continue Reading
Problem Solve Certificate based authentication Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Our company has users who reside outside the local area network. What's the best way to grant those users access to Outlook Web App? Continue Reading
Malware using seemingly real digital certificates is becoming more prevalent. Expert Nick Lewis discusses how to detect fraudulent certificates. Continue Reading
While Windows already comes preinstalled with a number of CA certificates, here's what to do if you need to install it. Continue Reading