Blog
Articles, interviews, and useful tips to help you with everything from starting a Premium Anycast DNS project to securing your organization against cyberthreats.
Articles, interviews, and useful tips to help you with everything from starting a Premium Anycast DNS project to securing your organization against cyberthreats.
Digital transformation has dramatically increased the number of identities organizations must secure - users, devices, applications, APIs, and workloads. At the heart of this trust ecosystem lies Public Key Infrastructure (PKI). But PKI alone is no longer enough. As highlighted in Excedo’s perspective on digital trust, certificate automation has become a business imperative, not just an IT improvement. With certificate lifespans shrinking and threats evolving rapidly, organizations must move beyond managing certificates to becoming crypto-agile. This blog explores what crypto-agility means, why it matters, and how organizations can evolve through a structured maturity journey.
Digital trust underpins every modern business interaction, from customer-facing services to internal systems and partner integrations. At the core of this trust lies Public Key Infrastructure (PKI) and the certificates that secure communication and verify identities. Yet, as digital environments grow more complex and certificate lifecycles continue to shrink, many organizations still rely on manual management processes. This creates hidden risks that can lead to unexpected outages, security gaps, and operational disruption. For business leaders, this is no longer just a technical concern - it is a matter of resilience, revenue protection, and maintaining customer trust. Automation is rapidly becoming essential to gaining control, reducing risk, and ensuring continuous digital operations.
Cybercrime does not scale because attackers are sophisticated. It scales because the infrastructure they depend on is easy to obtain, cheap to operate, and even easier to replace. The industry has already learned this lesson at the domain level. Weak identity controls enabled large-scale abuse. The response was clear: blocking alone does not work. Real impact comes from disrupting infrastructure at the source. Now the same pattern is repeating itself - one layer deeper. Autonomous System Numbers (ASNs) and IP address allocations are increasingly being used as the foundation for resilient cybercrime infrastructure. And the entry point is not technical, It is administrative.
Phishing and domain-enabled fraud are not “edge cases” in today’s threat landscape - they are a primary entry point. reports that phishing remains the dominant initial intrusion vector in Europe, accounting for 60% of cases in the reporting period covered by the ENISA Threat Landscape 2025. Against that backdrop, most organisations still rely heavily on passive controls: email filtering, URL reputation checks, and third‑party abuse lists. These controls matter - but they do not end the threat. They flag malicious infrastructure; they do not remove it.
Jan Stenbecks torg 17
164 40 KISTA
SWEDEN