Krupa Patil

Product Marketing Manager

A content creator focused on providing readers and prospective buyers with accurate, useful, and latest product information to help them make better informed decisions.

More from Krupa Patil

| Min Read

Symantec and Google Lock Horns over Certificate Trust

| Min Read

Federal BOD 19-02: Certificate outages are now federally-recognized threats!

| Min Read

The What, Why, and How of Certificate Lifecycle Management

| Min Read

Equifax to Pay Approx. $700 Million in Settlement of 2017 Data Breach Charges

| Min Read

Is Your Enterprise Protected Against Man-in-the-Middle Attacks?

| Min Read

AppViewX joins hands with PrimeKey to create integrated PKI Management Solutions

| Min Read

Certificate Lifecycle Management, Simplified

| Min Read

Are you prepared for the TLS 1.0/1.1 deprecation?

| Min Read

Why Let’s Encrypt Scrapped 3 Million TLS Certificates

| Min Read

SSH Credentials Targeted in Data Breach of Hosting Giant GoDaddy

| Min Read

PKI: To Build Or To Buy?

| Min Read

May 30 Sectigo Expiry Incident: Recap and Analysis

| Min Read

Postbank Security Breach Results In $3mm Being Stolen: Insight And Commentary

| Min Read

NIST recommendations for TLS Server Certificate Management: An Overview

| Min Read

Investing in Security and Cutting Costs Don’t Have to be Mutually Exclusive

| Min Read

Google Cloud and AppViewX Introduce instant CA deployment and lifecycle management platform

| Min Read

Gartner adds Machine Identity Management to its Hype Cycle for IAM Technologies, 2020

| Min Read

TLS Certificate Lifespans Now Capped at 13 Months

| Min Read

Beyond SSH Keys: Authentication using SSH Certificates

| Min Read

Building Digital Trust with Machine Identity Management

| Min Read

Visibility, Control, and Automation: The Three Key Ingredients for Managing Machine Identities

| Min Read

Key Takeaways from the Latest IDC Vendor Spotlight – The Underappreciated Virtues of a Comprehensive Certificate Management Strategy 

| Min Read

PKI and Identity-based Security – The Secret Sauce for Cyber Resilience

| Min Read

New Android Banking Trojan, SharkBot Discovered. Here’s What You Should Know.

| Min Read

GoDaddy Data Breach Exposes Data of 1.2 Million Customers

| Min Read

PKI: Securing a Variety of Use Cases in Today’s Digital Organizations

| Min Read

4 Ways to Manage Your Digital Certificates Efficiently And Stay Ahead Of The Cybersecurity Game

| Min Read

Identity-First Security Will Be A Top Priority In 2022. Are You Ready?

| Min Read

Comprehensive Certificate Lifecycle Management: An Integrated Approach

| Min Read

Why Is It Dangerous to Use Outdated Cryptography Standards?

| Min Read

Is Your Data Safe From Man-in-the-Middle (MitM) Attacks?

| Min Read

Why Is TLS 1.3 Better And Safer Than TLS 1.2?

| Min Read

Preparing for a TLS Upgrade: A Migration Plan

| Min Read

Toyota Shut Down Highlights The Growing Risk Of Supply Chain Attacks

| Min Read

Why Adopt PKI-based Identity Security For The Cloud?

| Min Read

Protect Your Private Keys: Secure Key Orchestration And Automation

| Min Read

How Healthcare Organizations Can Build Cyber Immunity With Machine Identity Management

| Min Read

Don’t Let Certificate Ownership Problems Cause Application Outages And Data Breaches

| Min Read

Biden Memo – A Powerful Reminder Of The Looming Threat Of Quantum Computing

| Min Read

The Security Risks Of Manual Certificate Lifecycle Management

| Min Read

Double Down On Mobile Security With Digital Certificates

| Min Read

Cyberattack Shuts Down Albania’s Government Systems and Services

| Min Read

NIST Rolls Out First Four Quantum-Resistant Encryption Algorithms

| Min Read

Passwords Are Becoming Weakest Links. Is Passwordless The Way Forward?

| Min Read

Securing The Critical Power And Utility Sector With PKI

| Min Read

Combatting Rising Ransomware Attacks Targeting Security Weaknesses In Public Schools

| Min Read

Seven Code Signing Best Practices You Need to Know

| Min Read

Staying Ahead Of Cyber Threats And Data Privacy Challenges In Financial Services

| Min Read

How To Protect Your Organization From Outages Caused By Expired Certificates

| Min Read

All You Need To Know About SSL Stripping Attacks

| Min Read

Why Automating Certificate Management Is Key To Securing DevOps Pipelines

| Min Read

Six Steps To Prepare Security For Quantum Computing Threats

| Min Read

How Railroads Can Harden Their Defenses and Get Ahead Of Cyber Threats in 2023

| Min Read

Practical Checklist For Crypto-Agility To Help You Get Ready For Post-Quantum Cryptography

| Min Read

Google Proposal To Reduce TLS Certificates Validity To 90 Days Puts Focus On Automated Certificate Lifecycle Management

| Min Read

What Are Certificate Auto-Enrollment Protocols And Why Are They Important?

| Min Read

Step Up Email Security With PKI – Why And How

| Min Read

4 Ways PKI Helps Secure IoT Devices

| Min Read

PKI: One Powerful Solution And Multiple Security Use Cases

| Min Read

Why You Must Go The SaaS And Automation Way To Step Up Your Cybersecurity Game

| Min Read

10 Best Practices For Continuous Compliance When Managing Digital Certificates

| Min Read

5 Ways You Can Prepare For Google’s 90-Day Certificates Proposal And Prevent Certificate-Related Outages

| Min Read

Seven Ways Short-lived Certificates Help Reinforce Security

| Min Read

Why Securing Ingress With TLS Is Key To Achieving Strong Kubernetes Security

| Min Read

Introducing AppViewX KUBE+ – A Certificate Lifecycle Management Solution Built To Secure Your Kubernetes Environments

| Min Read

Why Mutual TLS (mTLS) Is Critical For Securing Microservices Communications In A Service Mesh

| Min Read

Introducing AppViewX SIGN+ – A Fast and Reliable Code Signing Solution for Modern Software Supply Chains

| Min Read

Beware of Expired or Compromised Code Signing Certificates

| Min Read

Are Your Code Signing Processes Mature? A Guide to Navigating Your Code Signing Maturity Journey

| Min Read

Palo Alto PAN-OS Root and Default Certificates Are Expiring In Two Weeks. What You Need to Know.

| Min Read

How Secure Code Signing Aligns With The Principles of DevSecOps

| Min Read

Preparing For India’s New Data Protection Act With Secure Identity Management

| Min Read

Strengthening Medical Device Security With PKI

| Min Read

AnyDesk Breach Calls Urgent Attention To Code Signing Security

| Min Read

Four Reasons Why SSH Key Management Is Challenging

| Min Read

9 SSH Key Management Best Practices You Need to Know

| Min Read

Why SSH Certificates Can Be A Better Option For Remote Access Than SSH Keys

| Min Read

Microsoft Deprecates 1024-bit RSA Keys. Are You Prepared to Upgrade?

| Min Read

Why CISOs Need To Act On Quantum-Readiness Now

| Min Read

SSH vs. SSL/TLS: What’s The Difference?

| Min Read

The NIS2 Compliance Deadline Is Nearing. Are You Prepared?

| Min Read

PKI-Based Passkeys Lead The Way For A Passwordless Future

| Min Read

7 Reasons Why You Need To Replace Your Microsoft CA

| Min Read

Securing Kubernetes: The Risks Of Unmanaged Machine Identities

| Min Read

Preparing for the Quantum Leap with Hybrid Certificates

| Min Read

8 Essential Considerations for Post-Quantum Cryptography Migration

| Min Read

Chaos to Control: How Automated Certificate Discovery Can Enhance Visibility and Power Certificate Lifecycle Management

| Min Read

Top Trends in 2024 Reshaping the PKI Landscape

| Min Read

SSH Key Sprawl: Causes and Consequences

| Min Read

The First Set of Post-Quantum Cryptography Standards Are Out. What Should You Do Next?

| Min Read

Post-Quantum Cryptography: Sorting Fact from Fiction

| Min Read

What You Need to Know About “Harvest-Now, Decrypt-Later” Attacks

| Min Read

Key Takeaways from the 2024 ESG Report on Non-Human Identity (NHI) Management

| Min Read

Don’t Let an Expired Certificate Cause Critical Downtime. Prevent Outages with a Smart CLM

| Min Read

Apple Follows Google’s Lead: Get Ready for 45-Day TLS Certificate Lifespans

| Min Read

The Entrust Distrust Deadline is Closing In. Are you Prepared?

| Min Read

Why PKIaaS is a Smarter and Secure Alternative to On-Premises PKI

| Min Read

PKI and CLM Insights from 2024: Preparing for a Cyber Resilient 2025

| Min Read

A Closer Look at NIST’s Deadlines to Deprecate Legacy Encryption Algorithms

| Min Read

Certificate Management Best Practices to Stay Cyber-Secure This Holiday Season

| Min Read

Agent vs Agentless: Which Deployment to Choose for Certificate Lifecycle Management

| Min Read

The Role of PKI and Certificate Lifecycle Management in API Security

| Min Read

Google’s Willow Chip: Another Push to Start Your Post-Quantum Cryptography (PQC) Preparation Now

| Min Read

Certificate Management Self-Service Capabilities to Simplify Access and Boost Efficiency

| Min Read

Key Post-Quantum Cryptography Insights from the Executive Order On Strengthening And Promoting Innovation in the Nation’s Cybersecurity

| Min Read

Hardware Cryptographic Accelerators to Enhance Security Without Slowing Down

| Min Read

Let’s Encrypt Issued Its First Six-Day Certificate—Here’s Why Certificate Lifecycle Management Automation Matters

| Min Read

NIST Releases New Report on Crypto-Agility – What You Need to Know Now

| Min Read

Google Second-Gen Chromecast and Audio Devices Hit By A Major Outage—Expired Intermediate CA Certificate to Blame

| Min Read

From SSL to TLS 1.3: 30 Years of Encryption and Innovation

| Min Read

The UK’s National Cyber Security Centre Presents Timeline and Roadmap for PQC Migration

| Min Read

Building a Smarter, Safer Grid with IEEE 2030.5 and Certificate Lifecycle Management Automation

| Min Read

Why the Finance Sector Must Lead the Shift to Post-Quantum Cryptography

| Min Read

AVX ONE PQC Assessment Tool – Kickstart Your PQC Readiness Journey with Complete Cryptographic Visibility

| Min Read

Why Every Organization Needs a Crypto Center of Excellence (CCoE) Today

| Min Read

How Mature Is Your PKI? Find Out the Smart Way with the PKI Maturity Model

| Min Read

How Financial Institutions Can Meet DORA Compliance with Crypto-Agility

| Min Read

The EU Just Released a New Post-Quantum Cryptography (PQC) Roadmap: Here’s What You Need to Know

| Min Read

Chaos to Crypto-Agility: 5 Steps to Future-Proof Your PKI and Certificate Lifecycle Management (CLM)