“As organizations encrypt more traffic and machine identity usage skyrockets, so do the number of opportunities for cybercriminals,” said Nick Hunter, senior technical manager for Venafi. “Any type of encrypted tunnel can be exploited in a cyber attack, and most organizations manage hundreds of thousands of keys and certificates each day. This use will only […]
Latest Comments