Researchers Are Moving Up the Clock for ‘Q-Day’
The SSL Store Blog
by Casey Crane
6d ago
4 industry advances and the inaugural World Quantum Readiness Day underscore the importance of preparing now for quantum-based threats Several new quantum-focused research developments may have moved up the timeline for needing quantum-resistant cryptography. If you do nothing to prepare now, all of your data that’s secured by modern public key algorithms may be vulnerable to harvest now, decrypt later (HNDL) attacks in the future. Knowing this, DigiCert and other industry partners are leading the charge into a quantum-ready future by establishing a new quantum security-focused holiday. This e ..read more
Visit website
Phishing Statistics: The 21 Latest Phishing Stats to Know in 2024
The SSL Store Blog
by Casey Crane
3w ago
<60 seconds — this is the median time Verizon’s 2024 Data Breach Investigations Report (DBIR) indicates it takes users to fall for phishing emails. (21 seconds to click + 28 seconds to enter their data on a phishing site.) Check out the latest phishing statistics and data from Verizon and other industry leaders… IBM’s X-Force Threat Intelligence Index 2024 report shows that phishing as a top initial access vector in 2023 dropped 44% compared to 2022. But does this mean that phishing is going out of style? Unlikely — phishing constitutes 24/7 business opportunities for bad guys, which is lik ..read more
Visit website
15 PKI Uses and Applications (With Examples)
The SSL Store Blog
by Casey Crane
1M ago
PKI is everywhere — it secures everything from websites and emails to the smart devices you use to secure your home and business. It’s the hero operating in the background that you don’t know exists unless you know where to look… What do your smart coffee maker, our website, and a nuclear power plant have in common? They all rely on public key infrastructure (PKI) behind the scenes. But why is PKI so popular? It’s the secure, tried-and-true way to: Identify and authenticate authorized users and devices Encrypt data transmitted between two parties or systems Protect software, documents, and ot ..read more
Visit website
New Industry Standards Working Group Aims to Define Industry Terms
The SSL Store Blog
by Casey Crane
1M ago
The CA/B Forum’s newly approved “Definitions and Glossary Chartered Working Group” aims to standardize industry language to create clarity and consensus of terms used in security guidelines Within the cybersecurity industry, multiple terms can describe something, or a single term can describe several things. This is especially true within public key infrastructure (PKI). Think of a simple example using terms like “SSL” and “TLS.” Someone could use these terms to refer to the security protocols that layer over HTTP to create the secure HTTPS protocol, or to mean the digital certificates you ins ..read more
Visit website
Don’t Let These Password Cracking Attacks Catch You Off Guard
The SSL Store Blog
by Casey Crane
1M ago
Verizon’s 2023 Data Breach Investigations Report (DBIR) data indicates that 86% of web app-related data breaches involved the use of stolen credentials. Explore 9 password cracking methods and how to fight them Password compromises continue to be a leading security issue for organizations and their customers. 46% of Forbes’ U.S. OnePoll survey respondents say their passwords were breached in the past year. There are many reasons why passwords can become compromised. Sometimes, it’s something as simple as hardcoding your credentials into applications. But in most cases, these situations occur a ..read more
Visit website
Gartner Says PKI Was a Bigger Challenge in 2023 Than MFA
The SSL Store Blog
by Casey Crane
2M ago
Gartner reports taking “twice as many calls” about PKI and certificate lifecycle management (CLM) than multi-factor authentication (MFA)-related calls in 2023. Why is interest in PKI growing and why are so many organizations having PKI-related challenges? Let’s take a look… Erik Wahlström, Vice President and Key Initiative Leader of the Identity and Access Management Team at Gartner, recently shared in a LinkedIn post that organizations are increasingly interested in public key infrastructure (PKI) and managing their digital certificates. Is this growing interest because more companies are usi ..read more
Visit website
A Look at U.S. Business Email Compromise Statistics (2024)
The SSL Store Blog
by Casey Crane
2M ago
Data from the FBI Internet Crime Complaint Center (IC3) indicates that reported business email compromise scam losses are up nearly 58% since 2020. See where your state stands regarding the costs of these email channel scams… A business email compromise (BEC) attack will turn your average day into a scorching dumpster fire. BEC is a devastating technique that can result in everything from system compromises and data breaches to financial losses and reputational ruination. For this report, we’re focusing on the financial consequences — i.e., reported financial losses — this type of attack creat ..read more
Visit website
PKI Mistakes That Were So Bad They Made Headlines (12 Examples)
The SSL Store Blog
by Casey Crane
2M ago
Explore the public key infrastructure (PKI)-related lessons gleaned from public and private entities that got publicity for all the wrong reasons…   PKI is a critical part of most IT systems. When it works well, it’s largely invisible — authenticating connections and encrypting data without most users knowing it’s there. But when things go wrong, the results can be devastating. Let’s take a look at three common PKI mistakes and the (bad news) headlines they create. Now, we’re not here to bash organizations who made a PKI “oopsie.” However, we’re sharing all of this information to help you ..read more
Visit website
How to Sign a Word Document Using a Digital Signature Certificate
The SSL Store Blog
by Casey Crane
3M ago
Document signing isn’t just for PDFs. We’ll walk you through how to add a digital signature in Word using your document signing certificate on a Windows device Let’s cut to the chase: You bought a document signing certificate and want to know how to digitally sign a Word document using it. Or, you haven’t bought one yet but are wondering how easy it is to use this type of certificate if you do. Either way, we’re here to walk you through the process in the amount of time it takes to order from your favorite takeaway lunch joint.  Let’s hash it out. The post How to Sign a Word Document Usin ..read more
Visit website
5 Ways to Avoid Your Company Falling for Deepfake Scams
The SSL Store Blog
by Casey Crane
3M ago
Although deepfake technologies are still in their infancy, falling for scams utilizing them can cost you millions. The good news is that there are steps you can take to make yourself and your company more challenging targets for deepfake attackers. Generative AI technologies are getting more realistic as days go by. Many times, they can be used for good. But, as we learned in our recent article on generative AI and deepfake statistics, cybercriminals also use them to carry out nefarious activities. Unfortunately for one multinational financial firm, its employees learned (the hard way) what ha ..read more
Visit website

Follow The SSL Store Blog on FeedSpot

Continue with Google
Continue with Apple
OR