article thumbnail

CTO of Center for Internet Security Expounds on Transforming InfoSec

SecureWorld News

At the same time, we also have changes at every layer of the protocol stack and this is driven by an increased push for encryption—not just encryption, strong encryption.". We're responsible for the CIS benchmarks and the CIS controls.

InfoSec 72
article thumbnail

Risks to Your Network from Insecure Code Signing Processes

Security Boulevard

Plus, the practice of individually storing code signing keys results in an inscrutable and unsafe labyrinth of encryption keys, often referred to as key sprawl. Many InfoSec teams don’t have the visibility into what their software development teams are doing. In years past, InfoSec may have been the central keeper of code signing.

Risk 98
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Spotlight Podcast: RSA CTO Zulfikar Ramzan on confronting Digital Transformation’s Dark Side

The Security Ledger

In this Spotlight Edition of the podcast we're speaking with RSA Chief Technology Officer Zulfikar Ramzan about how his company is adapting to help its customers confront the dark side of digital transformation initiatives: increased digital risk, including from cloud, artificial intelligence and the Internet of Things.

article thumbnail

How to Overcome Common SSH Machine Identity Risks with Automation

Security Boulevard

Better visibility for InfoSec teams. Together, encryption key governance is achieved across the entire enterprise, protecting the full life cycle of keys from creation to termination, including the storage and auditing of those keys. Digital Transformation Fails without Machine Identity Management. Related Posts.

Risk 52
article thumbnail

Cyber Playbook: Effective User-Centric Authentication is Critical for Modern Business

Herjavec Group

Over the past three decades, businesses around the world have been undergoing a rapid digital transformation. With the rapid digital transformation that took place in the past 18 months, many teams including those responsible for IAM programs needed to adjust to ensure a smooth and fully secured transition.

article thumbnail

How You Can Effectively Manage Your SSH Keys Towards Zero Trust Security

Security Boulevard

It is the de-facto standard for remote administration of servers, with SSH keys acting as identities to enable automated authentication, encryption, and authorization. Because of the ongoing digital transformation efforts, large enterprises have accumulated tens of thousands of SSH keys in their environment.

Risk 52
article thumbnail

The Hacker Mind Podcast: The Fog of Cyber War

ForAllSecure

There’s an online war in Ukraine, one that you haven’t heard much about because that country is holding its own with an army of infosec volunteers worldwide. RSAC also attracts some of the top researchers in infosec. So that's the last key we can speak to Ukraine's Deputy Minister of digital transformation.