Thanks for attending our How to Stop Hackers From Hijacking Infrastructure webcast!
Is your agency doing everything it can to protect its software from foreign interference? Hackers are stealing code-signing private keys to make their malware look legitimate. Signing code is no longer enough to protect against this threat. Agencies need to protect the code signing credentials that they utilize and ensure that they are the only ever used for authorized circumstances.
- How to ensure that cybercriminals do not steal your code signing credentials
- How code signing is an effective tool to protect against PowerShell modification
- Homeland Security's CISA Alert AA220-006A and what precautions you should take to protect PowerShell scripts from 3rd party modification
Check out these additional Venafi resources:
Please contact me if you have any additional questions about this webcast or Venafi.
|
|
|
|
Samantha Barnes
703-581-6610
|
|
|