Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Survey: Post-It Notes, Spreadsheets Used To Manage Digital Certificates
Newest First  |  Oldest First  |  Threaded View
MS8699
50%
50%
MS8699,
User Rank: Apprentice
2/27/2012 | 7:38:30 AM
re: Survey: Post-It Notes, Spreadsheets Used To Manage Digital Certificates
The survey of 174 IT and IT security pros had several red flags about digital certificate management.
YRAV000
50%
50%
YRAV000,
User Rank: Apprentice
2/24/2012 | 5:47:54 AM
re: Survey: Post-It Notes, Spreadsheets Used To Manage Digital Certificates
IT managers using post-it notes and spreadsheets to manage millions of security instruments.
Georgeken
50%
50%
Georgeken,
User Rank: Apprentice
2/24/2012 | 5:09:02 AM
re: Survey: Post-It Notes, Spreadsheets Used To Manage Digital Certificates
Ya it's true ,its so difficult to keep track of it and the content here was good stuff
JonathonT
50%
50%
JonathonT,
User Rank: Apprentice
2/24/2012 | 3:31:58 AM
re: Survey: Post-It Notes, Spreadsheets Used To Manage Digital Certificates
I generally keep track of encryption keys with a key manager like GNU Privacy Assistant, passwords and other important phrases and small details with a password manager like PasswordSafe or Seahorse. As far as keeping track of SSL certificates and when they expired, most organizations I worked with would let the expiration pass by, and then they would have to scramble to get a new key. On the other hand, some of the bigger, Fortune 100-type companies that I worked with would keep track of the dates, and would be able to send out notifications and replacement keys as much as a month in advance. Kudos to those companies. What's the best scheduled solution for watching for expiration dates and sending automated reminders? Exchange? Sharepoint? A long-dormant cron job? Calendar reminders? I'd like to hear from workers at companies that track these reminders, and find out how they do it, and if there is anything they'd do differently to do it even better. I'd also like to hear from anyone else on their ideas for best-practice solutions and standardized software for the job.

--- Jonathon

cloudfilesecurity.biz
BDouglas
50%
50%
BDouglas,
User Rank: Apprentice
2/23/2012 | 10:54:05 PM
re: Survey: Post-It Notes, Spreadsheets Used To Manage Digital Certificates
Organizations need to quickly come to terms with how crucial encryption keys are to safeguarding the entire enterprise.
It's pure madness that large Fortune 500 companies are still using home-grown, manual processes to inventory and monitor encryption assets.-
Not only are all the recent security hacks a warning to the wise, but just the operational and compliance benefits alone are worth looking into an automated solution like this.
Bprince
50%
50%
Bprince,
User Rank: Ninja
2/23/2012 | 10:36:09 PM
re: Survey: Post-It Notes, Spreadsheets Used To Manage Digital Certificates
Very difficult to keep track of certs without some sort of tool...
Brian Prince, InformationWeek/Dark Reading Comment Moderator


Edge-DRsplash-10-edge-articles
7 Old IT Things Every New InfoSec Pro Should Know
Joan Goodchild, Staff Editor,  4/20/2021
News
Cloud-Native Businesses Struggle With Security
Robert Lemos, Contributing Writer,  5/6/2021
Commentary
Defending Against Web Scraping Attacks
Rob Simon, Principal Security Consultant at TrustedSec,  5/7/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-27840
PUBLISHED: 2021-05-12
A flaw was found in samba. Spaces used in a string around a domain name (DN), while supposed to be ignored, can cause invalid DN strings with spaces to instead write a zero-byte into out-of-bounds memory, resulting in a crash. The highest threat from this vulnerability is to system availability.
CVE-2021-20202
PUBLISHED: 2021-05-12
A flaw was found in keycloak. Directories can be created prior to the Java process creating them in the temporary directory, but with wider user permissions, allowing the attacker to have access to the contents that keycloak stores in this directory. The highest threat from this vulnerability is to ...
CVE-2021-28649
PUBLISHED: 2021-05-12
An incorrect permission vulnerability in the product installer for Trend Micro HouseCall for Home Networks version 5.3.1179 and below could allow an attacker to escalate privileges by placing arbitrary code on a specified folder and have that code be executed by an Administrator who is running a sca...
CVE-2021-31519
PUBLISHED: 2021-05-12
An incorrect permission vulnerability in the product installer folders for Trend Micro HouseCall for Home Networks version 5.3.1179 and below could allow an attacker to escalate privileges by placing arbitrary code on a specified folder and have that code be executed by an Administrator who is runni...
CVE-2021-32607
PUBLISHED: 2021-05-12
An issue was discovered in Smartstore (aka SmartStoreNET) through 4.1.1. Views/PrivateMessages/View.cshtml does not call HtmlUtils.SanitizeHtml on a private message.