Cyber-criminals are exploiting traditional measures of trust to gain a foothold on users systems by compromising trusted sites via background initiated requests, using phishing sites, and typo-squatting.
In an astonishing admission, Department of Health (DoH) officials have admitted that every single NHS trust in the UK has failed to meet cyber-security standards.
Digital security certificates assure regular users that the websites they visit can be trusted and are free of malicious code. But if security certificates are themselves compromised, how can users be protected from malicious hackers?
Patrick Sullivan, director, security technology and strategy at Akamai Technologies explains the concept of Zero Trust perimeters and cloud perimeters in an interview with SC Media UK's editor-in-chief, Tony Morbin.
70 percent of people say that they would stop doing business with companies following a data breach, but they are about to be engulfed in data breach reality with GDPR breach reporting as under-reporting of breaches is huge.
Dutch moves to strengthen the powers of its state authorities leads Mozilla to propose excluding Dutch CAs from its trust list - could form part of a wider undermining of trust in the Internet
Rick Orloff highlights the importance of trust between IT and employees, and how to restore it in the wake of the current cyber-crime climate, including communicating that you understand user concerns..
With hopes to provide a more seamless and secure experience of Windows apps, Microsoft will be ridding of the ranks of its Trusted Root Certificate programme.
Certificate and key errors are costing businesses dearly and undermining the global economy, according to a Ponemon/Venafi report.
As cyber-attacks become increasingly common, it's important that businesses understand the true cost of data breaches, says Wieland Alge.
While acknowledging threats from digital certificates, many security professionals are failing to get to grips with the problem, claims Venafi in a new report.
Caught with its pants down, Ashley Madison clearly failed to practice safe security. How damaging is this for the company and could users take it to court?
The FBI is now offering a guide on how to tackle the IT-savvy rogue employee problem.
Josh Goldfarb asks how can the infosec community move from informal and exclusive trust circles to more mature formal information sharing approaches, without losing agility and effectiveness.
Scammers are targeting discount hunters with fake vouchers.
Businesses do not get the concept of certificate management and there is a lack of trust between users, according to Venafi.