Skip to main content
banner image
venafi logo

CISO Viewpoint: How Important is Effective Key and Certificate Management to Cyber Security?

CISO Viewpoint: How Important is Effective Key and Certificate Management to Cyber Security?

two men sitting across the table talking, one facing the screen, one facing backwards
April 28, 2017 | Shelley Boose

We recently interviewed Tim Callahan, SVP, Global Chief Security Officer at Aflac. We wanted to find out why he recommends that organizations start looking at key and certificate management as a business imperative.

Callahan believes that it’s essential for organizations to know where all their certificates are located. If there are uncontrolled keys and certificates in your environment, they could be strategically placed by a cyber criminal to gain unauthorized access to your machine identities and create unauthorized tunnels on your network.

Watch the video below to see which three most common mistakes you should avoid with keys and certificates. 

 

 

Learn how using the right key and certificate security can give you the visibility you need to protect machine identities. Contact us.

Subscribe to our Weekly Blog Updates!

Join thousands of other security professionals

Get top blogs delivered to your inbox every week

See Popular Tags

You might also like

Spectre and Meltdown vulnerabilties

How to Prevent Meltdown and Spectre from Compromising Machine Identities

21% of websites use SHA-1

21% of Websites Still Use SHA-1. Don’t They Know It’s Broken?

generic_blog_banner_image

CISO Viewpoint: Why Get Serious about Your Cryptographic Risk Posture?

About the author

Shelley Boose
Shelley Boose

Shelley is Director of PR and Content Marketing at Venafi. In her own words, "I help companies translate complex technologies into engaging and compelling, digital stories."

Read Posts by Author
get-started-overlay close-overlay cross icon
get-started-overlay close-overlay cross icon
Venafi Risk assessment Form Image

Sign up for Venafi Cloud


Venafi Cloud manages and protects certificates



* Please fill in this field Please enter valid email address
* Please fill in this field Password must be
At least 8 characters long
At least one digit
At last one lowercase letter
At least one uppercase letter
At least one special character
(@%+^!#$?:,(){}[]~`-_)
* Please fill in this field
* Please fill in this field
* Please fill in this field
*

End User License Agreement needs to be viewed and accepted



Already have an account? Login Here

×
get-started-overlay close-overlay cross icon

How can we help you?

Thank you!

Venafi will reach out to you within 24 hours. If you need an immediate answer please use our chat to get a live person.

In the meantime, please explore more of our solutions

Explore Solutions

learn more

Email Us a Question

learn more

Chat With Us

learn more
Chat