Skip to main content
banner image
venafi logo

Digital Certificates: Why Companies Need to Take Control and Adopt Automation

Digital Certificates: Why Companies Need to Take Control and Adopt Automation

Digital certificates
August 10, 2017 | Emil Hanscom

In a recent interview with Computer Business Review, Venafi CIO & CISO Tammy Moskites discussed the importance of digital certificates. According to Tammy, machines use digital certificates to identify themselves, just as people identify themselves with user names and passwords. Essentially, digital certificates come with unique identifiable information and allow machines to communicate securely on the Internet.

Digital certificates are a foundational component of information security. “We rely on keys and certificates to know which machines can and cannot be trusted,” Tammy explained. “Imagine trying to run a business without knowing if the person you’re sending emails to is really that person or just an imposter.”

Unfortunately, enterprises frequently overlook the security of their digital certificates. Cyber criminals often abuse, steal or create fraudulent certificates to intercept and eavesdrop on communications, potentially allowing them alter the communication between two machines. In addition, attackers can use certificates to sign malware, making it appear to come from a legitimate and trusted source.

Despite these risks, most organizations spend most of their time and effort securing usernames and passwords. “Security professionals need to adopt the same approach to certificates as they have for users,” said Tammy. “No CISO would accept having thousands of unknown users accessing their networks, yet the average enterprise has around 16,500 unknown certificates on their network.”

Ultimately, organizations cannot ignore the security their digital certificates. They are a vital part of every business, agency and company. Want to learn more about digital certificates and the best tactics you can employ to protect them? See the full article on Computer Business Review.

Like this blog? We think you will love this.
Featured Blog

What Are SSL Stripping Attacks?

A bit of history The creator of SSL strip vulnerability is Moxie Marlinspike, a well-kn

Read More
Subscribe to our Weekly Blog Updates!

Join thousands of other security professionals

Get top blogs delivered to your inbox every week

See Popular Tags

You might also like

TLS Machine Identity Management for Dummies

TLS Machine Identity Management for Dummies

Certificate-Related Outages Continue to Plague Organizations
White Paper

CIO Study: Certificate-Related Outages Continue to Plague Organizations

About the author

Emil Hanscom
Emil Hanscom

Emil is the Public Relations Manager at Venafi. Passionate about educating the global marketplace about infosec and machine-identity issues, they have consistently grown Venafi's global news coverage year over year.

Read Posts by Author
get-started-overlay close-overlay cross icon
get-started-overlay close-overlay cross icon
Venafi Risk assessment Form Image

Sign up for Venafi Cloud

Venafi Cloud manages and protects certificates

* Please fill in this field Please enter valid email address
* Please fill in this field Password must be
At least 8 characters long
At least one digit
At last one lowercase letter
At least one uppercase letter
At least one special character
* Please fill in this field
* Please fill in this field
* Please fill in this field

End User License Agreement needs to be viewed and accepted

Already have an account? Login Here

get-started-overlay close-overlay cross icon

How can we help you?

Thank you!

Venafi will reach out to you within 24 hours. If you need an immediate answer please use our chat to get a live person.

In the meantime, please explore more of our solutions

Explore Solutions

learn more

Email Us a Question

learn more

Chat With Us

learn more