Is SSL Secure? Cutting through the Paranoia.

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

SSL certificates are the foundation of internet security, but they are increasingly under fire and, when improperly setup, become an unwatched door for cybercrime and cyber-espionage. Users – and your customers – trust SSL by default, which is why the online security protocol is the perfect attack tool.
As more and more certificates become compromised, it has led some to question the security of Certificate Authorities and the overall SSL infrastructure. But is SSL really broken, or is the paranoia a case of sensationalized news coverage? A recent report from the Ponemon Institute underscores the fact that organizations are failing to properly manage their certificates, with 51% globally admitting they have no idea how many keys and certificates they have in use and all of the 2000+ organizations polled indicating they had been victimized by man-in-the middle attacks as the result of a certificate compromise. 
The simple fact is that a lack of proper configuration is often responsible for SSL compromises, and solutions to the problem are within any organization’s reach – all it takes is a little time and know how. Join our panel of experts as they examine SSL infrastructure, its vulnerabilities, and provide simple steps that you and your organization can take to combat the threat. 


Photo of Drew Amorosi

Drew Amorosi

Deputy Editor, Infosecurity Magazine

Joe DeMesy

Senior Security Analyst, Bishop Fox

Photo of Jason Sabin

Jason Sabin

VP of Research and Development, DigiCert

Brought to you by

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see the privacy policy for DigiCert here: Please see Infosecurity Magazine’s privacy policy for more information.