Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

Most infosec pros forget to change keys after a breach

Maria Korolov | June 9, 2015
Most security professionals don't know how to respond if the keys are compromised during a breach.

SSH keys are used to authenticate administrators, servers, and clouds -- and never expire.

Bocek said that this was the fourth year Venafi had done a survey at the RSA, but that he couldn't provide historical comparisons because the company asked different questions each year.


Previous Page  1  2 

Sign up for Computerworld eNewsletters.