Response is not complete until trust is re-established By now most organizations have responded to the Heartbleed vulnerability by patching vulnerable systems. Good. The next step must be to replace ALL keys and certificates. Successful private key extraction exploitation in just hours shows keys and certificates must be assumed comprised. The urgency to replace keys […]
via Cloud Security Alliance Blog http://bit.ly/1pNwEEu
via Cloud Security Alliance Blog http://bit.ly/1pNwEEu
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.