The SolarWinds compromise in December 2020 and the ensuing investigation into their build services put a spotlight on supply chain attacks. This has generated a renewed interest by organizations to reevaluate their supply chain security posture, lest t…Read More 3 areas of implicitly trusted infrastructure that can lead to supply chain compromises
The public key infrastructure (PKI) underpins the most effective strategy for securing communications between machines, network and mobile devices, virtual servers, and the IoT, whether inside or outside the firewall. As the volume of machines, devices…Read More Dispelling four myths about automating PKI certificate lifecycle management
Digital certificate issuer Let’s Encrypt has announced that it has upgraded its infrastructure to allow it to issue 200 million certificates in one day.
The post Let’s Encrypt upgrades infrastructure, can now issue 200 million certificates in a day fir…