Media Coverage

CNN Money

February 20th, 2015

Lenovo slipped 'Superfish' malware into laptops

"This is exactly what bad guys do with trojans and other malicious software to trick users to access fake sites to surveil/monitor private communications."

Read More

 

Inovation Insights

February 18th, 2015

2015: Get Ready for More Attacks on Trust Read more: http://insights.wired.com/profiles/blogs/2015-get-ready-for-more-attacks-o

"2015 will also be the year when we look to not just manage keys and certificates, but also protect them and the trust they establish."

 

Read More

 

EWeek

February 5th, 2015

Google's Certificate Transparency Project Gains New Backers

"The whole point of Certificate Transparency is to mitigate against the risk of a certificate mis-issuance, whenever they [CAs] are issuing an SSL certificate."

Read More

 

The Washington Post

February 2nd, 2015

Why Internet users all around the world should be worried about China’s Great Firewall

"The Internet’s own immune system is capable of being turned against users anywhere in the world, giving governments the ability to “take control of our browsers and our smartphones.”

Read More

 

Information Week: Dark Reading

January 28th, 2015

NFL Mobile Sports App Contains Super Bowl-Sized Vulns

A very high percentage of users reuse passwords across multiple accounts, so the email/password combination for NFL Mobile may also be the same as those used to access sensitive corporate data, banking sites, or other high value targets

Read More

 

Threat Post

January 27th, 2015

Venafi to Launch Certificate Transparency Log

Venafi will be launching a public CT log that will satisfy the much needed Google CT log operator requirements of three public CT log servers.

Read More

 

Threatpost

January 27th, 2015

Venafi to Launch Certificate Transparency Log

Venafi will be launching a public CT log that will satisfy the much needed Google CT log operator requirements of three public CT log servers.

Read More

 

Threat Post

January 21st, 2015

Certificate Transparency Moves Forward with First Independent Log

"Certificate Transparency is designed to help solve some of the trust issue associated with the CA system. One feature of the framework is that in order to be compliant, CAs need to submit the certificates they issue to logs, all of which are publicly auditable and cryptographically assured."

Read More

 

Network World

January 19th, 2015

Chinese government b;amid for hacking Microsoft Outlook

CNNIC can issue certificates to intercept encrypted connections without your knowledge.

Read More

 

gov.uk

January 16th, 2015

Cyber security boost for UK firms

The measures we’re announcing today will boost the UK cyber security industry and ensure UK Plc can continue to stay safe and thrive online.

Read More

 1 2 3 >  Last ›