Blog Posts
Implications and Mitigation Strategies for the Loss of End-Entity Private Keys
When a private key in a public-key infrastructure (PKI) environment is lost or stolen, compromised end-entity certificates can be used to impersonate a principal that is associated with it....