Passwordless AND Keyless: The Future of (Privileged) Access Management

September 20, 2024 at 07:39AM Traditional privileged access management (PAM) solutions struggle to effectively handle SSH keys, which functionally differ from passwords. SSH keys outnumber passwords and grant widespread access, yet aren’t managed centrally, posing a security risk. Modern ephemeral access solutions bypass the need to manage passwords or keys, offering improved security and reduced … Read more

Millions of Devices Vulnerable to ‘PKFail’ Secure Boot Bypass Issue

July 26, 2024 at 05:24PM Millions of Intel and ARM-based computing systems are vulnerable to attackers due to a leaked cryptographic key used in the Secure Boot process. The issue, dubbed “PKFail,” allows bypassing of Secure Boot and affects devices from vendors like Lenovo, HP, and Asus. Firmware updates are needed to address this widespread … Read more

A Cost-Effective Encryption Strategy Starts With Key Management

May 14, 2024 at 04:09PM In today’s digital landscape, companies grapple with encryption challenges and find that a one-size-fits-all approach doesn’t suffice. While encryption is crucial for data security, managing decryption keys is equally essential. Additionally, the rising adoption of cloud services necessitates a thorough evaluation of key management practices. Finally, organizations should proactively prepare … Read more