Insights and Outlooks from the Digital Identity Market Leader

Aug 21, 2020 9:45:00 AM
Organizations have thousands, or even tens of thousands, of certificates. If you handle certificates in your company, this comes as no surprise. It's very complex and difficult to keep track of these certificates, much less mainta [...]
Aug 12, 2020 10:25:18 AM
SSL certificates automatically identify and authenticate public IP addresses’ by assigning each a public/private keypair attached to the server’s unique domain name. Embedding the domain name in the certificate is essential for id [...]
Aug 11, 2020 9:23:53 AM
Digital certificates (e.g. SSL/TLS, X.509) can be issued and managed through many different tools in your DevOps tool-chain. However, the more tools you have for managing the issuance of these certificates lead to gaps in security [...]
Aug 6, 2020 1:46:40 PM
The role that digital certificates – such as TLS/SSL and code-signing certificates – play to protect your business has reached critical importance.  
Aug 4, 2020 9:22:30 AM
X.509 certificate management involves the processes and procedures for buying, deploying, renewing, and revoking certificates in a network of connected applications, servers, systems, or other network parts. Practically all browse [...]
Jul 16, 2020 12:21:15 PM
TLS certificates serve many purposes. Primarily, they enable encrypted sessions between clients and the websites and prove that the site is not a malicious imposer. A good security practice is to renew key pairs frequently, which [...]
Jul 1, 2020 9:02:23 AM
An X.509 certificate is a vital safeguard against malicious network impersonators. Without x.509 server authentication, man-in-the-middle attacks can be initiated by malicious access points, compromised routers, etc.  
Jun 12, 2020 3:02:22 PM
Enterprises today run on applications, but keeping those applications up and running is a constant challenge, not to mention the task of securing them.  
Jun 4, 2020 12:16:48 PM
For all the gaps that exist between DevOps and security teams as enterprises try to balance speed of development and security simultaneously, there’s one thing that can bring these two teams together: the fight to stop disruptive [...]
Apr 6, 2016 9:46:39 AM
This blog is a continuation in a series of blogs, relating to the perils of adding Subject Alternate Name (SAN) information to a certificate signing request (CSR).