S/MIME

Sectigo Unveils Cybersecurity Industry’s First Zero-Touch S/MIME Solution

Retrieved on: 
Thursday, February 21, 2019

Sectigo Zero-Touch S/MIME enables both public and private S/MIME certificates to be issued from a single, cloud-based platform.

Key Points: 
  • Sectigo Zero-Touch S/MIME enables both public and private S/MIME certificates to be issued from a single, cloud-based platform.
  • Sectigo Certificate Manager enables S/MIME interoperability with secure email gateways (SEGs) so that enterprises can continue scanning encrypted emails an industry first.
  • Sectigo sends the entire encryption key history to all desktop and mobile mail applications, enabling decryption of older emails.
  • Available today, Zero-Touch deployment S/MIME is a single application within the larger enterprise management platform offered by Sectigo.

Diamond Key Security Names Russ Housley to Advisory Council

Retrieved on: 
Tuesday, January 8, 2019

CHICAGO, Jan. 8, 2019 /PRNewswire/ -- Diamond Key Security (DKS) is pleased to welcome Russ Housley, Founder and Owner of Vigil Security, LLC, to its Advisory Council.

Key Points: 
  • CHICAGO, Jan. 8, 2019 /PRNewswire/ -- Diamond Key Security (DKS) is pleased to welcome Russ Housley, Founder and Owner of Vigil Security, LLC, to its Advisory Council.
  • "We are thrilled to welcome Russ to the council," said DKS Managing Director and Board Member W. Stuart Jones.
  • Housley has also authored two books about Internet security: Planning for PKI: Best Practices Guide for Deploying Public Key Infrastructure and Implementing Email and Security Tokens: Current Standards, Tools, and Practices.
  • Russ has written more than 85 RFCs; many of them cover Internet security topics such as S/MIME electronic mail security, Internet public key infrastructure (PKI), and Internet protocol security (IPsec).

Cloud security experts at Hornetsecurity dispute headlines questioning email encryption standards

Retrieved on: 
Wednesday, May 16, 2018

However, as Hornetsecurity experts point out, the vulnerabilities discovered do not impact the security protocols themselves but use already known weaknesses in recipients' email clients to make them decrypt an encrypted email and deliver it to the attacker, thereby bypassing encryption protocols.

Key Points: 
  • However, as Hornetsecurity experts point out, the vulnerabilities discovered do not impact the security protocols themselves but use already known weaknesses in recipients' email clients to make them decrypt an encrypted email and deliver it to the attacker, thereby bypassing encryption protocols.
  • "This kind of unsubstantiated exaggeration doesn't help the cause of increasing the wider use of encryption and providing better overall security," Hornetsecurity CEO Oliver Dehning said.
  • Encryption and decryption are fully automated by Hornetsecurity in the cloud no installation, maintenance or user interaction is required.
  • Today, Hornetsecurity has grown to more than 100 employees, offering comprehensive security solutions in the fields of email security, web security and data storage to more than 30,000 business customers around the world.