Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


Study: Enterprises Losing Faith In Digital Certificates, Crytographic Keys

On the heels of Heartbleed and other vulnerabilities, many enterprises are not confident in the ability of digital certificates to protect their data, Ponemon report says

Security professionals are losing confidence in the ability of digital certificates and encryption keys to protect their data, according to a study published Wednesday.

The Ponemon Institute released its bi-annual Cost of Failed Trust report, a survey of 2,300 IT security pros across the globe. This year's results indicate that over the next two years, the risk facing every Global 5000 enterprise from attacks on keys and certificates is at least $53 million (USD), an increase of 51 percent from 2013.

The study, which was developed in conjunction with encryption vendor Venafi, says that the number of keys and certificates deployed on infrastructure -- such as Web servers, network appliances, and cloud services -- grew more than 34 percent over the last two years, to almost 24,000 per enterprise. Some 54 percent of respondents admitted to not knowing where all keys and certificates are located and how they're being used.

Virtually all of the respondents said their organizations have responded to multiple attacks on keys and certificates over the last two years. Incidents involving enterprise mobility certificates were assessed to have the largest total impact, at over $126 million among the 2,300 respondents.

Security researchers are reporting an increasing number of attacks on enterprises, principally man-in-the-middle attacks, that use false or compromised digital certificates to fool devices into giving up data or credentials. Researchers at Intel in December posted a blog stating that stealing certificates to sign malware will be "the next big market" for cyber criminals.

One of the key reasons for the growing problem is the rapid proliferation of keys and certificates across the enterprise, says Kevin Bocek, vice president of security strategy at Venafi. As enterprises take on new, network-based applications and technologies -- such as cloud services and mobile systems -- they increase the number of keys and certificates they use while losing visibility of where they are.

"Most of the key management systems we've seen to this point have provided vaults for storing the keys, but they don't really provide much more than that," Bocek says.

Venafi used the release of the Ponemon study as a platform for the launch of Venafi TrustNet, a new reputation service that helps enterprises gauge the trustworthiness of digital certificates and see where their own certificates are being used. The new service could help enterprises identify and stop the misuse of their certificates by attackers, Bocek says. 

Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
User Rank: Strategist
3/14/2015 | 2:20:38 PM
It's time to wake up
Up till now the industry has enjoyed plain content storage in backend networks banking on remoteness for security.  Heartbleed, Shellshock, Stuxnet and the like are telling the industry to rethink this strategy, perhaps consider backend hardware hardening as done for front end systems like PCI standards for payment terminals.  I think condifence can be regained with secure rooting of digital certificates i.e. strong protections to underlying private keys.
User Rank: Ninja
3/12/2015 | 9:50:49 AM
Certificate Store and Frequent Changes
I think that it behooves an organization to have an internal certificate store. With this method you have more options. Level of encoding, visibility over certs, etc. This also will provide a more efficient and expedient method of changing certs. By changing the cert more frequently you are decreasing your risk substantially. This process is much easier when you are the one who governs it, instead of a third party.
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/1/2020
Ripple20 Threatens Increasingly Connected Medical Devices
Kelly Sheridan, Staff Editor, Dark Reading,  6/30/2020
DDoS Attacks Jump 542% from Q4 2019 to Q1 2020
Dark Reading Staff 6/30/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
The Threat from the Internet--and What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-07-01
The Journal theme before 3.1.0 for OpenCart allows exposure of sensitive data via SQL errors.
PUBLISHED: 2020-07-01
SAP Solution Manager (Trace Analysis), version 7.20, allows an attacker to perform a log injection into the trace file, due to Incomplete XML Validation. The readability of the trace file is impaired.
PUBLISHED: 2020-07-01
In nDPI through 3.2, the packet parsing code is vulnerable to a heap-based buffer over-read in ndpi_parse_packet_line_info in lib/ndpi_main.c.
PUBLISHED: 2020-07-01
In nDPI through 3.2, the H.323 dissector is vulnerable to a heap-based buffer over-read in ndpi_search_h323 in lib/protocols/h323.c, as demonstrated by a payload packet length that is too short.
PUBLISHED: 2020-07-01
In nDPI through 3.2, the OpenVPN dissector is vulnerable to a heap-based buffer over-read in ndpi_search_openvpn in lib/protocols/openvpn.c.