Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

certkit@infosec.exchangeC

certkit@infosec.exchange

@certkit@infosec.exchange
About
Posts
2
Topics
2
Shares
0
Groups
0
Followers
0
Following
0

View Original

Posts

Recent Best Controversial

  • CertKit Agent 1.6: RRAS support, deploy windows, and agent locking.
    certkit@infosec.exchangeC certkit@infosec.exchange

    CertKit Agent 1.6: RRAS support, deploy windows, and agent locking.

    Shorter lifetimes mean certificate automation has to act like real deployments: issue, deploy, verify. Deploy windows keep disruptions inside maintenance windows, and agent locking freezes commands so UI changes can’t be weaponized.

    Link Preview Image
    CertKit Agent update: RRAS support, deploy windows, and agent locking

    The CertKit Agent now supports Microsoft RRAS for VPN certificate management. We also added deploy windows so you can control when certificate updates happen, and agent locking to protect your infrastructure even if CertKit itself were ever compromised.

    favicon

    CertKit SSL Certificate Management (www.certkit.io)

    #CertificateAutomation #WebPKI

    Uncategorized certificateauto webpki

  • 22,000+ incidents in the Verizon DBIR.
    certkit@infosec.exchangeC certkit@infosec.exchange

    22,000+ incidents in the Verizon DBIR. Man-in-the-middle? Less than 4%, mostly phishing proxies. Not TLS interception.

    Forward Secrecy killed "record now, decrypt later." So what actually compromises your connections?

    Link Preview Image
    How likely is a man-in-the-middle attack?

    A stolen TLS private key sounds catastrophic. But thanks to forward secrecy, it can't decrypt recorded traffic. The only thing left is server impersonation, and that requires network position that ranges from "be in the same room" to "be a nation-state." We looked at the data on how often this actually happens.

    favicon

    CertKit SSL Certificate Management (www.certkit.io)

    #cybersecurity #TLS

    Uncategorized cybersecurity tls
  • Login

  • Login or register to search.
  • First post
    Last post
0
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups