> Venafi > Real-world Attack Case Study: Misuse of Keys and Certificates Bypass Critical Security Controls
 

Real-world Attack Case Study: Misuse of Keys and Certificates Bypass Critical Security Controls

Case Study Published By: Venafi
Venafi
Published:  Mar 26, 2015
Type:  Case Study
Length:  24 pages

This technical case study addressing key and certificate security issues is designed for security conscious enterprises to understand real-life attack scenarios that threaten their businesses in today’s world. This white paper demonstrates a recent attack that used cryptographic keys and digital certificates as well as guidance on how to protect certificates and keys and quickly discover and remediate breaches. This paper should be read by more technical IT security sta? who are interested in detailed attack methods and remediation tactics. The executive summary is intended for IT Security leaders (CISOs and their direct reports) and addresses the proof-of-concept attack impacts on the business.



Tags : 
secutiry, certificates, keys, security attacks, business

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept