
Hari Nair
Director of Product Management /*=$expert->feature_status*/ ?>
Venafi
Comments Dotted :
1
January 10, 2020
Quantum computing promises even more disruption in the future.
SHA-1 usage is one more indication that most organization aren’t putting enough emphasis on protecting the keys and certificates that serve as machine identities:
SHA-1 was first tagged as weak and vulnerable back in 2005. As of January 2015, public certificate authorities were forbidden from issuing SHA-1 certs that expired after December 2016. Since 2017, the most popular web browsers have been preventing and discouraging SHA-1 use by warning users/consumers of ‘invalid.....Read More
