Our website uses cookies

Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing Infosecurity Magazine, you agree to our use of cookies.

Okay, I understand Learn more

Is SSL Secure? Cutting through the Paranoia.

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up for yours below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in out online comments.
Your password should be at least six characters long. It is case sensitive. Passwords can only consist of alphanumeric characters or ~!@#$%^&*()_-+=?.

By registering you agree with our terms and conditions and privacy policy.

SSL certificates are the foundation of internet security, but they are increasingly under fire and, when improperly setup, become an unwatched door for cybercrime and cyber-espionage. Users – and your customers – trust SSL by default, which is why the online security protocol is the perfect attack tool.
As more and more certificates become compromised, it has led some to question the security of Certificate Authorities and the overall SSL infrastructure. But is SSL really broken, or is the paranoia a case of sensationalized news coverage? A recent report from the Ponemon Institute underscores the fact that organizations are failing to properly manage their certificates, with 51% globally admitting they have no idea how many keys and certificates they have in use and all of the 2000+ organizations polled indicating they had been victimized by man-in-the middle attacks as the result of a certificate compromise. 
The simple fact is that a lack of proper configuration is often responsible for SSL compromises, and solutions to the problem are within any organization’s reach – all it takes is a little time and know how. Join our panel of experts as they examine SSL infrastructure, its vulnerabilities, and provide simple steps that you and your organization can take to combat the threat. 


Drew Amorosi

Drew Amorosi Deputy Editor, Infosecurity Magazine

Joe DeMesy

Joe DeMesy Senior Security Analyst, Bishop Fox

    Jason Sabin

    VP of Research and Development, DigiCert

      Brought to You by