Key Post-Quantum Cryptography Insights from the Executive Order On Strengthening And Promoting Innovation in the Nation’s Cybersecurity
AppViewX Blog
by Krupa Patil
3d ago
Ever since the U.S. National Institute of Standards and Technology (NIST) set 2030 as the deadline for retiring legacy encryption algorithms like RSA and ECDSA, the PKI industry is abuzz with activity. By now, it is unmistakably clear that transitioning to post-quantum cryptography (PQC) is not optional or a distant probability; it is a necessity ..read more
Visit website
How a Simple DNS Error Impacted a Major Financial Organization—And How You Can Avoid the Same Fate
AppViewX Blog
by Vignesh Kumar Kathiravan
1w ago
In a world where digital transactions power entire economies, even a single keystroke can trigger a chain reaction of vulnerabilities. That’s exactly what happened when MasterCard discovered a tiny, yet dangerous DNS typo that quietly persisted for nearly five years. As reported by Krebs on Security, the slip—an innocent “.ne” instead of “.net”—meant some of ..read more
Visit website
Certificate Management Self-Service Capabilities to Simplify Access and Boost Efficiency
AppViewX Blog
by Krupa Patil
1w ago
Organizations today operate in dynamic and fast-paced environments, where multiple cross-functional teams are working together to develop, deploy, and manage infrastructure, cloud services and applications. These teams need digital certificates at nearly every stage for various purposes and at different times. The responsibility of issuing and managing these certificates often falls on the shoulders of ..read more
Visit website
Streamline Certificate Lifecycle Management with AppViewX AVX ONE CLM and ServiceNow
AppViewX Blog
by Cally Fritsch
3w ago
ServiceNow is a leading ITSM platform that helps organizations optimize IT services, workflows, and digital experiences. It streamlines processes like service requests, incident management, and change approvals, improving efficiency and service delivery. Its robust Configuration Management Database (CMDB) provides holistic visibility of IT assets and their relationships. One critical IT service area that cannot be ..read more
Visit website
Google’s Willow Chip: Another Push to Start Your Post-Quantum Cryptography (PQC) Preparation Now
AppViewX Blog
by Krupa Patil
1M ago
As 2024 drew to a close, Google caught global attention with the announcement of its latest quantum computing chip, Willow. Many believe that with Willow, Google has set a new benchmark for 2025, unveiling the extraordinary potential of quantum computing and what the quantum future could look like in the days ahead. If you think ..read more
Visit website
The Role of PKI and Certificate Lifecycle Management in API Security
AppViewX Blog
by Krupa Patil
1M ago
Imagine booking a flight online. You check airline schedules, compare ticket prices, reserve seats, and make payments—all on a single website. This seamless experience is made possible by the power of APIs (Application Programming Interfaces) that enable different applications, like the airline’s booking system, payment gateways, and our email provider, to communicate and work together ..read more
Visit website
Addressing PKI Management Pitfalls: From Chaos to Clarity
AppViewX Blog
by Ashish Kumar
1M ago
Effective Public Key Infrastructure (PKI) management needs to combine ways of handling PKI infrastructure along with the recommended best practices. In many cases, management of digital signatures or certificates is not that widely understood and can often lead to an outage that could have been proactively prevented. This mismanagement of certificates can also impact safe ..read more
Visit website
Securing Modern Applications in Amazon EKS with AVX ONE CLM for Kubernetes
AppViewX Blog
by Vignesh Kumar Kathiravan
1M ago
Modern applications are increasingly deployed in containers to leverage scalability, availability, and simplified maintenance. Migrating legacy applications to managed Kubernetes services like Amazon Elastic Kubernetes Service (Amazon EKS) provides significant benefits such as automated orchestration, self-healing capabilities, load balancing, and seamless scalability across both cloud and hybrid environments. Amazon EKS allows development teams to focus ..read more
Visit website
AppViewX 2025 Predictions: Machine Identity Security, Certificate Lifecycle Management and PKI
AppViewX Blog
by Christian Simko
1M ago
In 2024, we certainly witnessed some interesting trends and disruptions in machine and non-human management, certificate lifecycle management (CLM), and PKI. In research from the Enterprise Strategy Group, non-human (machine) identities are outnumbering human identities in enterprise environments by more than 20:1. Following on Google’s previous proposal on reducing TLS certificate validity to 90 days ..read more
Visit website
Machine Identity Was the Focus at Gartner’s IAM Summit
AppViewX Blog
by Prasanth Sundararajan
1M ago
Last week’s Gartner IAM Summit in Grapevine, Texas, was a whirlwind of insights, particularly around machine identity management (MIM). The event underscored the transformative trends and challenges shaping the domain, providing both thought leadership and actionable strategies for businesses navigating these complexities. Expanding IAM to Embrace Machine and Non-Human Identities Human identity management and machine ..read more
Visit website

Follow AppViewX Blog on FeedSpot

Continue with Google
Continue with Apple
OR