PRTODAY / NewswireToday Free press release distribution service network

Written by / Agency / Source: SafeNet, Inc.

Check Ads Availability|e-mail Article

Are you the owner of this article?, Turn it PREMIUM with your LOGO instead - and make it 3rd party Ads-Free! within the next hour!

Latest Breaches Expose PKI’s Greatest Weakness – Encryption Keys - SafeNet’s Experts offer guidelines to re-establishing trust in PKI -
Latest Breaches Expose PKI’s Greatest Weakness – Encryption Keys


NewswireToday - /newswire/ - Baltimore, MD, United States, 2011/09/22 - SafeNet’s Experts offer guidelines to re-establishing trust in PKI - Euronext NL0000400653 GTO

Your Banner Ad Here instead - Showing along with ALL Articles covering IT Security/Anti-Spam Announcements

Replace these Affiliate Programs at ANYTIME! Your banner here within the next hour. Learn How!


As a direct result of the recent security breaches impacting organizations that rely on Public Key Infrastructure (PKI) to encrypt and authenticate online communications and transactions, SafeNet, Inc., a worldwide leader in data protection, today issued several security guidelines to better secure PKI-based transactions.

For all the infrastructure advantages and business benefits of PKI, recent breaches clearly indicate that the way in which PKI is implemented may not be as inherently secure as most organizations have mistakenly assumed. What hasn’t been clearly understood is that the private key system used by PKI to encrypt and decrypt messages creates a single and significant point of vulnerability. A recent flurry of breaches involving certificate authorities have exposed this weakness, and have shaken the very foundation of trust that organizations have in PKI.

In order to help enterprises build greater integrity and reliability into their PKI deployments, eliminate unwanted exposure and close security gaps, SafeNet’s cryptographic experts advise the following actions:

1. Know your options for securing keys, weigh the risks, and choose wisely. All recent breaches have had a common theme –private keys and certificates were protected in software, and were left vulnerable. Software-based security has many benefits – it’s portable and offers great flexibility. Software can be copied easily and live in multiple locations at the same time, making the very benefits of software the areas of greatest security risk. A hardware-based security module (HSM) creates the trust anchor that locks the private keys and only allows access to vital information from an authorized source. Similarly, hardware based tokens and cards lock the certificates and avoid software based certificate risks.

2. Don’t assume that because you are working with a certificate authority your infrastructure is secure. If you rely on the certificate authority to authenticate, authorize, and secure application services, understand that the certificate itself is the vital piece within PKI. If the certificate private key is compromised, the entire PKI environment is compromised. Utilize layers of secure cryptography and select hardware-based options when securing your critical processing PKI end points.

3. Plan for the next generation of critical applications. Traditional PKI end points have historically included certificate authorities, registration authorities, SSL servers, and applications servers. These have now expanded to include mission-critical business processing applications, such as the smart grid, financial transactions, digital invoices, code signing, and secure device manufacturing. The nature of advanced PKI applications demands greater diligence, given the risk profile of the applications it enables. It is critical to establish a trust anchor for the protection and issuance of keys and certificates within these vital applications, ensuring that keys cannot be stolen, and the operations/transactions performed by those keys are auditable.

“PKI is many beneficial things, but standalone security isn’t one of them,” said Mark Yakabuski, vice president, product management for SafeNet. “It is important to realize the certificate identity itself is the vital piece within PKI – if the certificate identity is compromised, the PKI environment is compromised. The good news is that critical certificate identities can be secured with the proper hardware-based security mechanisms.”

Yakabuski is available for additional commentary. He can also provide examples of HSMs could have mitigated the damage done by recent security events, including APT attacks on certificate authorities, SSL certificate attacks, device code signing, and even the Stuxnet Worm.

About Hardware Security Modules
HSMs are defined as an anchor of trust, providing protection for applications, transactions, authorizations and information assets by safeguarding the cryptographic keys that are at the heart of any digital identity environment. An HSM can ensure the certificate private keys it protects are maintained in physical hardware, throughout the lifecycle of the private key.

With hardware-based protection, an HSM adds multiple layers of security and protects keys against the threats that software-based servers are susceptible to. For example, an HSM:

1. Encrypts the keys themselves;
2. Ensures that the keys remain within the secure hardware device throughout the key management lifecycle;
3. Ensures that only authorized applications and users can access and use the HSM-protected critical private keys; and
4. Ensures the logging and auditing of the certificate private keys.

HSMs only allow for the copying of keys from hardware to hardware. Keys exist solely in the restricted HSMs, and are under the control of defined custodians, allowing for tracking and auditing assurance of the certificate private keys they create.

About SafeNet, Inc.
Founded in 1983, SafeNet, Inc. ( is one of the largest information security companies in the world, and is trusted to protect the most sensitive data for market-leading organizations around the globe. SafeNet’s data-centric approach focuses on the protection of high value information throughout its lifecycle, from the data center to the cloud. More than 25,000 customers across commercial enterprises and government agencies trust SafeNet to protect and control access to sensitive data, manage risk, ensure compliance, and secure virtual and cloud environments.

Your Banner Ad Here instead - Showing along with ALL Articles covering IT Security/Anti-Spam Announcements

Replace these Affiliate Programs at ANYTIME! Your banner here within the next hour. Learn How!


Written by / Agency / Source: SafeNet, Inc.


Availability: All Regions (Including Int'l)


Traffic Booster: [/] Quick Newswire Today Visibility Checker


Distribution / Indexing: [+] / [Company listed above is a registered member of our network. Content made possible by PRZOOM / PRTODAY indexing services]

# # #
IT Security Anti-Spam Computer Security - Purchase keywords tags antivirus software firewall spyware removal virus scan computer security IT Security Anti-Spam malware / Banner Ads!.

  Your Banner Ad showing on ALL
IT Security/Anti-Spam articles,
CATCH Visitors via Your Competitors Announcements!

Latest Breaches Expose PKI’s Greatest Weakness – Encryption Keys

Company website links NOT available to basic submissions
It is OK to republish and/or LINK any newswire for any legitimate media purpose as long as you name Newswire Today and LINK as the source.
  Is this your article?
Activate ALL web links and social stream by Upgrading to Press Release PREMIUM Plan Now!

SafeNet, Inc. |
Publisher Contact: 
410-931-7500 investor[.]
Newswire Today - PRZOOM / PRTODAY disclaims any content contained in this article. If you need/wish to contact the company who published the current release, you will need to contact them - NOT us. Issuers of articles are solely responsible for the accuracy of their content. Our complete disclaimer appears here.
IMPORTANT INFORMATION: Issuance, publication or distribution of this press release in certain jurisdictions could be subject to restrictions. The recipient of this press release is responsible for using this press release and the information herein in accordance with the applicable rules and regulations in the particular jurisdiction. This press release does not constitute an offer or an offering to acquire or subscribe for any SafeNet, Inc. securities in any jurisdiction including any other companies listed or named in this release.

IT Security/Anti-Spam via RSSAdd NewswireToday - PRZOOM Headline News to FeedBurner
Find who RetweetFollow @NewswireTODAY

Are you the owner of this article?, Turn it PREMIUM with your LOGO instead - and make it 3rd party Ads-Free! within the next hour!

Read Latest Articles From SafeNet, Inc. / Company Profile

Read IT Security/Anti-Spam Most Recent Related Newswires:

Centrify Analytics Service Stops Breaches in Real-time Based on User Behavior
Radware Receives ICSA Labs Excellence in Information Security Testing Award
Rohde & Schwarz Cybersecurity Now Provides Dedicated Security Solutions for IoT Automotive Telematics
Leonardo and International Golden Group Partner for Cyber Security in The Middle East
Verint Named to 2017 CRM Watchlist
Frost & Sullivan Commends Coronet’s Pioneering Mobile Security Product that Protects Against Commjacking
Verint Partners with Frontline to Expand Customer Engagement Solutions Across the Netherlands
Aricent and Rohde & Schwarz Cybersecurity Unveil A Unique Bandwidth Control Solution to Enhance Customer Experience for Mobile Operators
Radware Secures Deal with Leading Content Delivery Network to Support its Security Services Over Three Year Period
Ensono Achieves EU-US Privacy Shield Certification
Accenture Integrates Blockchain Technology with Thales Hardware Security Module to Address Key Risks for Financial Services, Government, Healthcare an
Bitdefender Wins ‘Outstanding Product’ Award from AV-Comparatives
Rohde & Schwarz Cybersecurity Showcases At RSA 2017 Solutions for Secure Internet of Things
Leading Insurance Company in Southeast Asia to Deploy Verint Customer Engagement Optimization Solutions
Rambus Introduces High Bandwidth Memory PHY on GLOBALFOUNDRIES FX-14™ ASIC Platform Using 14nm LPP Process Technology

Boost Your Social Network
& Crowdfunding Campaigns

NewswireToday Celebrates 10 Years in Business



Visit  La Bella Bakery Artisan Bakery Arizona

  ©2017 Newswire Today — Limelon Advertising, Co.
Home | About | Advertise/Pricing | Contact | Investors | Privacy/TOS | Sitemap | FRANCAIS
newswire, PR free press releases distribution service magazines engine news alert newsroom press room breaking news public relations articles company news alerts newswiredistribution ezine bizentrepreneur biznewstoday digital business report market search pr firms agencies reports distri-bution today investor relation successful internet entrepreneurs newswire distribution freenewswiredistribution asianewstoday bizwiretoday USA pr UK today - NOT affiliated with PRNewswire as we declined their partnership offer in 2013
PRTODAY & NewswireTODAY are NOT affiliated with USA TODAY (