<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Netrust</title>
	<atom:link href="https://www.netrust.net/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.netrust.net/</link>
	<description>Netrust</description>
	<lastBuildDate>Wed, 06 May 2026 09:34:57 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=7.0</generator>

<image>
	<url>https://www.netrust.net/wp-content/uploads/2021/05/Netrust-favicon-01.png</url>
	<title>Netrust</title>
	<link>https://www.netrust.net/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>SSL Certificate Renewal:  What Actually Happens Behind the Scenes</title>
		<link>https://www.netrust.net/blog/ssl-certificate-renewal-what-actually-happens-behind-the-scenes/</link>
		
		<dc:creator><![CDATA[Melissa Ang]]></dc:creator>
		<pubDate>Thu, 21 May 2026 02:00:28 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[SSL Certificates]]></category>
		<guid isPermaLink="false">https://www.netrust.net/?p=13019</guid>

					<description><![CDATA[<p>Many people think renewing an SSL certificate is just a quick click. In practice, it is rarely that simple. From what we see working with customers, renewal is usually part of a larger process. It involves multiple steps, and if something is missed, it can lead to warnings or even downtime. Why frequent renewal is now required SSL certificates no longer</p>
<p>The post <a href="https://www.netrust.net/blog/ssl-certificate-renewal-what-actually-happens-behind-the-scenes/" data-wpel-link="internal">SSL Certificate Renewal:  What Actually Happens Behind the Scenes</a> appeared first on <a href="https://www.netrust.net" data-wpel-link="internal">Netrust</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p class="wp-block-paragraph">Many people think renewing an SSL certificate is just a quick click.</p>



<p class="wp-block-paragraph">In practice, it is rarely that simple.</p>



<p class="wp-block-paragraph">From what we see working with customers, renewal is usually part of a larger process. It involves multiple steps, and if something is missed, it can lead to warnings or even downtime.</p>


<div class="wp-block-image">
<figure class="aligncenter size-full is-resized"><img fetchpriority="high" decoding="async" width="1000" height="667" class="wp-image-13104" style="aspect-ratio: 1.4992888417882142; width: 457px; height: auto;" src="http://www.netrust.net/wp-content/uploads/2026/04/shutterstock_2300812275.jpg" alt="" srcset="https://www.netrust.net/wp-content/uploads/2026/04/shutterstock_2300812275.jpg 1000w, https://www.netrust.net/wp-content/uploads/2026/04/shutterstock_2300812275-300x200.jpg 300w, https://www.netrust.net/wp-content/uploads/2026/04/shutterstock_2300812275-768x512.jpg 768w" sizes="(max-width: 1000px) 100vw, 1000px" /></figure>
</div>


<h2 class="wp-block-heading"><strong>Why frequent renewal is now required</strong></h2>



<p class="wp-block-paragraph">SSL certificates no longer last for 398 days.</p>



<p class="wp-block-paragraph">As of March 2026, certificates can be issued for up to 200 days. This is shorter than before, and it is getting shorter.</p>



<p class="wp-block-paragraph">The idea is simple. Shorter lifespans reduce risk. If something goes wrong, it limits how long a certificate can be misused.</p>



<p class="wp-block-paragraph">In reality, many organisations are already moving to even shorter cycles. This is usually supported by automation.</p>



<p class="wp-block-paragraph">From experience, teams that still manage certificates manually tend to struggle more as these timelines get shorter.</p>



<p class="wp-block-paragraph">Renewal ensures:</p>



<ul class="wp-block-list">
<li>The website remains secure</li>



<li>Continued browser trust</li>



<li>Certificate details remain up to date</li>
</ul>



<h2 class="wp-block-heading"><strong>Here is what happens behind the scenes:</strong></h2>



<p class="wp-block-paragraph"><strong><u>Step 1: Creating a new request</u></strong></p>



<p class="wp-block-paragraph"> When a certificate is renewed, the system will usually generate a new security key.</p>



<p class="wp-block-paragraph">This key is kept private. It is what protects the connection between the website and its visitors.</p>



<p class="wp-block-paragraph">A request is then created using this key. This is often called a certificate request.</p>



<p class="wp-block-paragraph">It contains basic details about the website, along with a public version of the key.</p>



<p class="wp-block-paragraph">In most environments, generating a new key is considered good practice. It reduces the risk of older keys being reused over time.</p>



<p class="wp-block-paragraph"><strong><u>Step 2: Checking your identity</u></strong></p>



<p class="wp-block-paragraph">Next, the Certificate Authority needs to confirm that you still control the domain.</p>



<p class="wp-block-paragraph">This is an important step regardless of the issuing Certificate Authority. It prevents someone else from requesting a certificate for your website.</p>



<p class="wp-block-paragraph">For Domain Validation, this can be quick.</p>



<p class="wp-block-paragraph">You might be asked to do any of the following:</p>



<ul class="wp-block-list">
<li>Approve an email sent to your domain</li>



<li>Add a DNS record</li>



<li>Upload a small file to your website</li>
</ul>



<p class="wp-block-paragraph">For Organisation Validation, there are more checks.</p>



<p class="wp-block-paragraph">These may include verifying your business registration and confirming your company details.</p>



<p class="wp-block-paragraph">For Extended Validation, the checks go even further. The Certificate Authority will review your organisation more thoroughly.<br /><br /><strong><u>Step 3: Issuing the new certificate</u></strong></p>



<p class="wp-block-paragraph">Once everything is verified, the certificate is issued.</p>



<p class="wp-block-paragraph">You will receive a few files. Each one plays a role in establishing trust.</p>



<p class="wp-block-paragraph">These include:</p>



<ul class="wp-block-list">
<li>Your main certificate</li>



<li>Intermediate certificates</li>



<li>The root certificate (already trusted by browsers)</li>
</ul>



<p class="wp-block-paragraph">Together, they form what is called a certificate chain.</p>



<p class="wp-block-paragraph">If this chain is not set up properly, browsers may show warnings even if the certificate itself is valid.</p>



<p class="wp-block-paragraph">There is also something happening in the background that most people do not see.</p>



<p class="wp-block-paragraph">New certificates are recorded in public logs. This adds an extra layer of transparency, allowing browsers and security systems to detect suspicious or unauthorised certificates.</p>



<p class="wp-block-paragraph"><strong><u>Step 4: Installing the certificate</u></strong></p>



<p class="wp-block-paragraph">The new certificate then needs to be installed.</p>



<p class="wp-block-paragraph">This usually means replacing the old certificate and making sure the full chain is configured correctly.</p>



<p class="wp-block-paragraph">In smaller setups, this might be straightforward.</p>



<p class="wp-block-paragraph">In larger environments, it can be more complex. Certificates may need to be updated across multiple servers, load balancers, or cloud services.</p>



<p class="wp-block-paragraph">This is where we often see issues. A certificate is renewed, but not deployed everywhere it needs to be.</p>


<div class="wp-block-image">
<figure class="aligncenter size-full is-resized"><img decoding="async" width="1000" height="575" class="wp-image-13105" style="width: 454px; height: auto;" src="http://www.netrust.net/wp-content/uploads/2026/04/shutterstock_2622743327.jpg" alt="" srcset="https://www.netrust.net/wp-content/uploads/2026/04/shutterstock_2622743327.jpg 1000w, https://www.netrust.net/wp-content/uploads/2026/04/shutterstock_2622743327-300x173.jpg 300w, https://www.netrust.net/wp-content/uploads/2026/04/shutterstock_2622743327-768x442.jpg 768w" sizes="(max-width: 1000px) 100vw, 1000px" /></figure>
</div>


<div class="wp-block-spacer" style="height: 20px;" aria-hidden="true"> </div>



<p class="wp-block-paragraph">When someone visits your website, their browser runs a series of checks.</p>



<p class="wp-block-paragraph">This happens in seconds.</p>



<p class="wp-block-paragraph">The browser will:</p>



<ul class="wp-block-list">
<li>Check that the certificate is valid</li>



<li>Confirm it has not expired</li>



<li>Verify the issuing authority</li>



<li>Match it to the domain</li>
</ul>



<p class="wp-block-paragraph">It will also validate the full certificate chain.</p>



<p class="wp-block-paragraph">When an SSL certificate expires, the connection is no longer secure, resulting not only in downtime, but also in exposing systems to potential cyber threats and causing reputational damage. This is why timely renewal is critical.</p>


<div class="wp-block-image">
<figure class="aligncenter size-full is-resized"><img decoding="async" width="1000" height="563" class="wp-image-13106" style="aspect-ratio: 1.7762505782065685; width: 454px; height: auto;" src="http://www.netrust.net/wp-content/uploads/2026/04/shutterstock_2084660419.jpg" alt="" srcset="https://www.netrust.net/wp-content/uploads/2026/04/shutterstock_2084660419.jpg 1000w, https://www.netrust.net/wp-content/uploads/2026/04/shutterstock_2084660419-300x169.jpg 300w, https://www.netrust.net/wp-content/uploads/2026/04/shutterstock_2084660419-768x432.jpg 768w" sizes="(max-width: 1000px) 100vw, 1000px" /></figure>
</div>


<h2 class="wp-block-heading"><strong>A quick note on automation</strong></h2>



<p class="wp-block-paragraph">With shorter certificate lifespans, manual processes become harder to manage.</p>



<p class="wp-block-paragraph">This is why many organisations are moving towards automation.</p>



<p class="wp-block-paragraph">In most modern setups, certificates can be requested, renewed, and installed automatically in the background.</p>



<p class="wp-block-paragraph">From what we see, this significantly reduces missed renewals and operational overhead.</p>



<p class="wp-block-paragraph">Automation helps to:</p>



<p class="wp-block-paragraph">• Renew certificates on time<br />• Handle shorter validity periods<br />• Reduce manual errors</p>



<p class="wp-block-paragraph">Solutions like <a href="https://www.netrust.net/ngssl/" data-wpel-link="internal">Next-Generation SSL</a> are designed to manage this centrally.</p>



<p class="wp-block-paragraph">Instead of tracking certificates individually, teams can monitor and manage everything in one place.</p>



<h2 class="wp-block-heading"><strong>Final thoughts</strong></h2>



<p class="wp-block-paragraph">SSL renewal is not just a routine task.</p>



<p class="wp-block-paragraph">It is something that needs to be managed continuously.</p>



<p class="wp-block-paragraph">As environments grow, manual handling becomes difficult to maintain. This is where many teams start to feel the strain.</p>



<p class="wp-block-paragraph">More organisations are now treating certificates as part of their ongoing security operations, rather than as something handled only occasionally. If your team is facing similar challenges, it may be worth looking at how an automation solution like <a href="https://www.netrust.net/ngssl/" data-wpel-link="internal">Next-Generation SSL</a> can help to simplify operations and reduce risk.</p>
<p>The post <a href="https://www.netrust.net/blog/ssl-certificate-renewal-what-actually-happens-behind-the-scenes/" data-wpel-link="internal">SSL Certificate Renewal:  What Actually Happens Behind the Scenes</a> appeared first on <a href="https://www.netrust.net" data-wpel-link="internal">Netrust</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Security Key Management: The Backbone of Digital Trust</title>
		<link>https://www.netrust.net/blog/security-key-management-the-backbone-of-digital-trust/</link>
		
		<dc:creator><![CDATA[Eng Jing Wee]]></dc:creator>
		<pubDate>Thu, 07 May 2026 02:00:52 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<guid isPermaLink="false">https://www.netrust.net/?p=12852</guid>

					<description><![CDATA[<p>These days, almost everything relies on cryptography in one way or another, whether it is SSL/TLS, digital signing, identity systems, or encryption. But when people talk about security, they usually focus on the algorithm or the technology itself. What often gets overlooked is something much more practical: how the keys are managed. Because no matter how strong the encryption is, if</p>
<p>The post <a href="https://www.netrust.net/blog/security-key-management-the-backbone-of-digital-trust/" data-wpel-link="internal">Security Key Management: The Backbone of Digital Trust</a> appeared first on <a href="https://www.netrust.net" data-wpel-link="internal">Netrust</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="935" height="502" class="wp-image-12855" src="http://www.netrust.net/wp-content/uploads/2026/04/pic-1.png" alt="" srcset="https://www.netrust.net/wp-content/uploads/2026/04/pic-1.png 935w, https://www.netrust.net/wp-content/uploads/2026/04/pic-1-300x161.png 300w, https://www.netrust.net/wp-content/uploads/2026/04/pic-1-768x412.png 768w" sizes="auto, (max-width: 935px) 100vw, 935px" /></figure>



<div class="wp-block-spacer" style="height: 20px;" aria-hidden="true"> </div>



<p class="wp-block-paragraph">These days, almost everything relies on cryptography in one way or another, whether it is SSL/TLS, digital signing, identity systems, or encryption.</p>



<p class="wp-block-paragraph">But when people talk about security, they usually focus on the algorithm or the technology itself. What often gets overlooked is something much more practical: how the keys are managed.</p>



<p class="wp-block-paragraph">Because no matter how strong the encryption is, if the keys are poorly handled, the whole thing can fall apart.</p>



<h2 class="wp-block-heading"><strong><strong>What is security key management?</strong></strong></h2>



<div class="wp-block-media-text has-media-on-the-right is-stacked-on-mobile">
<div class="wp-block-media-text__content">
<p class="wp-block-paragraph">In simple terms, it is the way cryptographic keys are handled from start to finish.</p>



<p class="wp-block-paragraph">That includes:</p>



<ul class="wp-block-list">
<li>how the keys are created</li>



<li>where they are stored</li>



<li>who is allowed to access them</li>



<li>when they should be rotated</li>



<li>how they are revoked or destroyed</li>
</ul>



<p class="wp-block-paragraph">It sounds straightforward, but this is one of the most important parts of any cryptographic system.</p>
</div>
<figure class="wp-block-media-text__media"><img loading="lazy" decoding="async" width="590" height="442" class="wp-image-12918 size-full" src="https://www.netrust.net/wp-content/uploads/2026/04/Pic-2-2.png" alt="" srcset="https://www.netrust.net/wp-content/uploads/2026/04/Pic-2-2.png 590w, https://www.netrust.net/wp-content/uploads/2026/04/Pic-2-2-300x225.png 300w" sizes="auto, (max-width: 590px) 100vw, 590px" /></figure>
</div>



<h2 class="wp-block-heading"><strong><strong>Why does it matter?</strong></strong></h2>



<p class="wp-block-paragraph">A lot of security problems in real environments are not caused by weak encryption. They happen because keys are not managed properly.</p>



<p class="wp-block-paragraph">For example:</p>



<ul class="wp-block-list">
<li>private keys are stored in plaintext</li>



<li>certificates expire without anyone noticing</li>



<li>the same keys are kept in use for too long</li>



<li>nobody has a clear view of where certificates are deployed</li>
</ul>



<p class="wp-block-paragraph">Once a key is exposed or mishandled, the impact can be serious.</p>



<p class="wp-block-paragraph">An attacker may be able to impersonate a system, decrypt sensitive information, or get around the trust built into the environment. And when it reaches that stage, the problem is no longer minor. It becomes a full compromise.</p>



<h2 class="wp-block-heading"><strong><strong>What good key management looks like</strong></strong></h2>

<p>First, keys should be generated properly using strong standards and in a secure environment. For more sensitive use cases, this is usually done inside an HSM.</p>
<p>Second, private keys need to be stored securely. They should never be left exposed or kept in insecure locations. Depending on the setup, this could mean using HSMs, TPMs, or a cloud KMS.</p>
<p>Third, access must be controlled properly. Not everyone should be able to view or use sensitive keys. Good practice includes role-based access control, separation of duties, and stronger approval controls for critical actions.</p>
<p>Then there is the lifecycle itself. Keys should be rotated regularly, replaced before expiry, and retired properly when they are no longer needed.</p>

<h2 class="wp-block-heading"><strong><strong>The challenge in real life</strong></strong></h2>



<p class="wp-block-paragraph">In theory, all of this sounds manageable. In reality, it often is not.</p>



<p class="wp-block-paragraph">Certificates end up scattered across servers, load balancers, applications, and cloud platforms. Different teams may be using different CAs. Some environments still rely heavily on spreadsheets or manual tracking. After some time, nobody has a complete picture anymore.</p>



<p class="wp-block-paragraph">That is usually when problems start showing up, such as expired certificates, unmanaged keys, duplicated certificates, or avoidable outages.</p>



<p class="wp-block-paragraph">This is why centralised management and automation matter so much. At a certain scale, manual handling is just not enough.</p>



<h2 class="wp-block-heading"><strong>What actually helps</strong></h2>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" width="519" height="270" class="wp-image-12857" style="aspect-ratio: 1.9223868503298993; width: 782px; height: auto;" src="http://www.netrust.net/wp-content/uploads/2026/04/Pic-4.png" alt="" srcset="https://www.netrust.net/wp-content/uploads/2026/04/Pic-4.png 519w, https://www.netrust.net/wp-content/uploads/2026/04/Pic-4-300x156.png 300w" sizes="auto, (max-width: 519px) 100vw, 519px" /></figure>



<div class="wp-block-spacer" style="height: 20px;" aria-hidden="true"> </div>



<p class="wp-block-paragraph">In practice, a few things make the biggest difference: using HSMs for critical keys, centralising certificate and key management, reducing reliance on manual tracking, automating renewals and monitoring, limiting access to authorised personnel, and ensuring key usage is logged and auditable.</p>



<p class="wp-block-paragraph">These are not complicated measures, but they are the ones that make a real difference in reducing risk.</p>



<p class="wp-block-paragraph">The organisations likely to struggle in the PQC transition are not those lacking quantum expertise.</p>



<h2 class="wp-block-heading"><strong>Final thoughts</strong></h2>



<p class="wp-block-paragraph">At the end of the day, key management is really about control and visibility.</p>



<p class="wp-block-paragraph">You can have strong encryption and a solid security design, but if the keys are not managed properly, the whole setup is at risk.</p>



<p class="wp-block-paragraph">This is why key management is not just an operational concern. It is a critical part of overall security.</p>



<p class="wp-block-paragraph">&nbsp;</p>



<p class="wp-block-paragraph">&nbsp;</p>



<p class="wp-block-paragraph">Follow us on <a href="https://www.linkedin.com/company/netrust-pte-ltd" data-wpel-link="external" rel="external noopener noreferrer"><strong>LinkedIn</strong></a> for the latest happenings/updates.</p>
<p>The post <a href="https://www.netrust.net/blog/security-key-management-the-backbone-of-digital-trust/" data-wpel-link="internal">Security Key Management: The Backbone of Digital Trust</a> appeared first on <a href="https://www.netrust.net" data-wpel-link="internal">Netrust</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>High Stakes and Digital Trust: My Reality as a Netrust Presales Consultant</title>
		<link>https://www.netrust.net/blog/high-stakes-and-digital-trust-my-reality-as-a-netrust-presales-consultant/</link>
		
		<dc:creator><![CDATA[Tommy Goh]]></dc:creator>
		<pubDate>Thu, 23 Apr 2026 01:10:24 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Life]]></category>
		<guid isPermaLink="false">https://www.netrust.net/?p=12834</guid>

					<description><![CDATA[<p>If you looked at my calendar right now, you would see a colourful Tetris-like board of Teams meeting links, RFP deadlines, and site visit reminders. People often ask what a “Presales Consultant” actually does. In short, I’m the bridge between a “cool idea” and a technical reality that actually works. At Netrust, my client base focuses on Singapore and the wider</p>
<p>The post <a href="https://www.netrust.net/blog/high-stakes-and-digital-trust-my-reality-as-a-netrust-presales-consultant/" data-wpel-link="internal">High Stakes and Digital Trust: My Reality as a Netrust Presales Consultant</a> appeared first on <a href="https://www.netrust.net" data-wpel-link="internal">Netrust</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p class="wp-block-paragraph">If you looked at my calendar right now, you would see a colourful Tetris-like board of Teams meeting links, RFP deadlines, and site visit reminders. People often ask what a “<strong>Presales Consultant</strong>” actually does. In short, I’m the bridge between a “cool idea” and a technical reality that actually works.</p>



<p class="wp-block-paragraph">At Netrust, my client base focuses on Singapore and the wider APAC region, which means my day-to-day is anything but predictable.</p>


<div class="wp-block-image">
<figure class="aligncenter size-full is-resized"><img loading="lazy" decoding="async" width="1000" height="660" class="wp-image-12832" style="aspect-ratio: 1.5151771370592713; width: 454px; height: auto;" src="http://www.netrust.net/wp-content/uploads/2026/04/shutterstock_2655599695.jpg" alt="" srcset="https://www.netrust.net/wp-content/uploads/2026/04/shutterstock_2655599695.jpg 1000w, https://www.netrust.net/wp-content/uploads/2026/04/shutterstock_2655599695-300x198.jpg 300w, https://www.netrust.net/wp-content/uploads/2026/04/shutterstock_2655599695-768x507.jpg 768w" sizes="auto, (max-width: 1000px) 100vw, 1000px" /></figure>
</div>


<div class="wp-block-spacer" style="height: 20px;" aria-hidden="true"> </div>



<h2 class="wp-block-heading"><strong>The Morning Sprint (and the Caffeine)</strong></h2>



<p class="wp-block-paragraph">My day usually starts with a quick scan of the regional landscape. Because I handle the APAC market, I might be answering a technical query from a partner in Thailand at 9:00 AM, then pivoting immediately to a high-level strategy session for a Singapore government project an hour later.</p>



<p class="wp-block-paragraph">It’s not just about “selling.” I spend a lot of time playing detective, digging into a client’s infrastructure to find out why their existing security is failing them. Are they struggling with manual document signing? Is their certificate management a mess? That’s where the “consultant” part of my title actually earns its keep.</p>



<h2 class="wp-block-heading"><strong>Turning Chaos into Compliance</strong></h2>



<p class="wp-block-paragraph">When I’m in these meetings, I’m not just talking about abstract concepts. I’m matching real-world headaches with the specific solutions we have at Netrust. Here are the three heavy hitters that usually dominate my conversations:</p>



<ul class="wp-block-list">
<li><strong><a href="https://www.netrust.net/products/pki/managed-pki-internal-pki/" data-wpel-link="internal">Managed CA Services</a>:</strong> This is the heart of what we do. As Singapore&#8217;s only IMDA-accredited Certificate Authority, we provide what “root-of-trust” companies crave. I often talk to banks or government agencies that need high-assurance identities. Whether they want us to host it or need an internal PKI built on their premises, we provide the legal certainty that their digital IDs actually mean something.</li>



<li><strong><a href="https://www.netrust.net/products/pki/certificate-lifecycle-management/" data-wpel-link="internal">Certificate Lifecycle Management (CLM)</a>:</strong> If you want to see a CISO&#8217;s blood pressure rise, mention “expired SSL/TLS certificates.” With public TLS certificate lifespans dropping to 47-day cycles by 2029, manual tracking in spreadsheets is a recipe for disaster. I spend a lot of time demoing our CLM platforms, showing how it automates discovery, renewal, and provisioning so the lights stay on without a human having to intervene.</li>



<li><strong><a href="https://www.netrust.net/digital-signing/nsignhub/" data-wpel-link="internal">nSignHub</a>:</strong> This is the “productivity hero.” It’s our cloud-based signing workflow. I love showing this to teams that are still chasing people for physical signatures. <strong>nSignHub</strong> handles everything from “Sign with Singpass” to Netrust Secure Electronic Signature, which is AATL-trusted and recognised globally by Adobe and Microsoft. It turns a week-long paper trail into a five-minute digital process.</li>
</ul>

<h2 class="wp-block-heading"><strong>The APAC Hustle</strong></h2>

<p class="wp-block-paragraph">The best part of the job is the variety. One day, I’m navigating the specific regulatory requirements of the Singapore Electronic Transactions Act (ETA), and the next, I’m helping a regional enterprise scale their certificate authority infrastructure across three different time zones.</p>


<div class="wp-block-image">
<figure class="aligncenter size-full is-resized"><img loading="lazy" decoding="async" width="733" height="488" class="wp-image-12874" style="aspect-ratio: 1.5020652556754506; width: 463px; height: auto;" src="http://www.netrust.net/wp-content/uploads/2026/04/Pic-3.jpg" alt="" srcset="https://www.netrust.net/wp-content/uploads/2026/04/Pic-3.jpg 733w, https://www.netrust.net/wp-content/uploads/2026/04/Pic-3-300x200.jpg 300w" sizes="auto, (max-width: 733px) 100vw, 733px" /></figure>
</div>


<div class="wp-block-spacer" style="height: 20px;" aria-hidden="true"> </div>



<p class="wp-block-paragraph">It’s a busy life, sure. There are days when the RFPs feel endless, and the technical requirements are a mile long. But there’s a specific kind of buzz you get when a complex solution finally clicks into place.</p>



<h2 class="wp-block-heading"><strong>The Verdict</strong></h2>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="1024" height="367" class="wp-image-12875" src="http://www.netrust.net/wp-content/uploads/2026/04/Pic-4.jpg" alt="" srcset="https://www.netrust.net/wp-content/uploads/2026/04/Pic-4.jpg 1024w, https://www.netrust.net/wp-content/uploads/2026/04/Pic-4-300x108.jpg 300w, https://www.netrust.net/wp-content/uploads/2026/04/Pic-4-768x275.jpg 768w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<div class="wp-block-spacer" style="height: 20px;" aria-hidden="true"> </div>

<p>Life at Netrust isn&#8217;t about sitting behind a screen all day. It’s about being in the thick of the APAC digital transformation. It’s fast, it’s furious, and it’s incredibly rewarding to be the person who helps turn “We need to be secure” into “<strong>We are Netrust-secured</strong>.”</p>

<p class="wp-block-paragraph">If you want to see me in action (or just want to see if I can actually explain PKI without using a 50-deck PowerPoint), let’s talk! Contact us at <a href="https://www.netrust.net/contact-us/" data-wpel-link="internal">https://www.netrust.net/contact-us/</a>.</p>



<p class="wp-block-paragraph">&nbsp;</p>

<p>Follow us on <a href="https://www.linkedin.com/company/netrust-pte-ltd" data-wpel-link="external" rel="external noopener noreferrer"><strong>LinkedIn</strong></a> for the latest happenings/updates.</p><p>The post <a href="https://www.netrust.net/blog/high-stakes-and-digital-trust-my-reality-as-a-netrust-presales-consultant/" data-wpel-link="internal">High Stakes and Digital Trust: My Reality as a Netrust Presales Consultant</a> appeared first on <a href="https://www.netrust.net" data-wpel-link="internal">Netrust</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The 47-Day Certificate Era and the Post-Quantum Reality: Are We Ready?</title>
		<link>https://www.netrust.net/blog/the-47-day-certificate-era-and-the-post-quantum-reality-are-we-ready/</link>
		
		<dc:creator><![CDATA[Edwin Lee]]></dc:creator>
		<pubDate>Thu, 09 Apr 2026 02:00:44 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[SSL Certificates]]></category>
		<guid isPermaLink="false">https://www.netrust.net/?p=12780</guid>

					<description><![CDATA[<p>There are two things happening in the SSL/TLS world right now that, in isolation, are manageable. Together, they’re disruptive. The first is well known: quantum computing is moving from theoretical research into practical engineering. Whether we think it will take 5 years or 15, one thing is clear: the public key algorithms protecting today’s internet were not designed for a quantum-capable</p>
<p>The post <a href="https://www.netrust.net/blog/the-47-day-certificate-era-and-the-post-quantum-reality-are-we-ready/" data-wpel-link="internal">The 47-Day Certificate Era and the Post-Quantum Reality: Are We Ready?</a> appeared first on <a href="https://www.netrust.net" data-wpel-link="internal">Netrust</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p class="wp-block-paragraph">There are two things happening in the SSL/TLS world right now that, in isolation, are manageable.</p>



<p class="wp-block-paragraph">Together, they’re disruptive.</p>



<p class="wp-block-paragraph">The first is well known: quantum computing is moving from theoretical research into practical engineering. Whether we think it will take 5 years or 15, one thing is clear: the public key algorithms protecting today’s internet were not designed for a quantum-capable adversary.</p>



<p class="wp-block-paragraph">The second is more immediate and operational: the CA/Browser Forum has formalised the progressive reduction of SSL/TLS certificate validity periods, culminating in a maximum lifespan of 47 days by 2029.</p>



<p class="wp-block-paragraph">Forty-seven days.</p>



<p class="wp-block-paragraph">That’s not a typo.</p>



<p class="wp-block-paragraph">If you run a public website, APIs, cloud workloads, or anything customer-facing, this isn’t just a compliance detail. It’s an operational shift.</p>



<h2 class="wp-block-heading"><strong>Why This Combination Is Different</strong></h2>



<p class="wp-block-paragraph">Let’s break it down.</p>



<p class="wp-block-paragraph"><strong>1. The Post-Quantum Shift Is About Crypto Agility</strong></p>



<p class="wp-block-paragraph">Most organisations are not worried about quantum computers breaking RSA tomorrow.</p>



<p class="wp-block-paragraph">What they <em>should</em> be thinking about is this:</p>



<p class="wp-block-paragraph">When PQC becomes production-ready and mandated, how fast can you transition?</p>



<p class="wp-block-paragraph">If your certificate infrastructure is rigid, manually managed, and scattered across business units, then the real risk isn’t quantum; it’s organisational inertia.</p>



<p class="wp-block-paragraph">Crypto agility is not about deploying PQC today.</p>



<p class="wp-block-paragraph">It’s about ensuring you can switch when the time comes.</p>



<p class="wp-block-paragraph"><strong>2. 47-Day Certificates Change the Operating Model</strong></p>



<p class="wp-block-paragraph">For years, certificate management was treated as an administrative task. A renewal reminder here, a spreadsheet there.</p>



<p class="wp-block-paragraph">That model doesn’t survive a 47-day validity world.</p>


<div class="wp-block-image">
<figure class="aligncenter size-full is-resized"><img loading="lazy" decoding="async" width="1000" height="692" class="wp-image-12788" style="aspect-ratio: 1.4451224429450822; width: 622px; height: auto;" src="http://www.netrust.net/wp-content/uploads/2026/04/shutterstock_2278173803.jpg" alt="" srcset="https://www.netrust.net/wp-content/uploads/2026/04/shutterstock_2278173803.jpg 1000w, https://www.netrust.net/wp-content/uploads/2026/04/shutterstock_2278173803-300x208.jpg 300w, https://www.netrust.net/wp-content/uploads/2026/04/shutterstock_2278173803-768x531.jpg 768w" sizes="auto, (max-width: 1000px) 100vw, 1000px" /></figure>
</div>


<div class="wp-block-spacer" style="height: 20px;" aria-hidden="true"> </div>



<p class="wp-block-paragraph">At 47 days:</p>



<ul class="wp-block-list">
<li>Renewals become constant</li>



<li>Manual tracking becomes error-prone</li>



<li>Outage risk increases exponentially</li>



<li>Audit and compliance complexity grows</li>
</ul>



<p class="wp-block-paragraph">Shorter lifespans are good for ecosystem security.</p>



<p class="wp-block-paragraph">But they demand automation.</p>



<h2 class="wp-block-heading"><strong>The Real Issue Isn’t PQC. It’s Lifecycle Management.</strong></h2>



<p class="wp-block-paragraph">Based on what we observe across industries, the real bottleneck isn’t algorithm readiness.</p>



<p class="wp-block-paragraph">It’s visibility.</p>



<p class="wp-block-paragraph">Many organisations don’t have:</p>



<ul class="wp-block-list">
<li>A complete inventory of their SSL/TLS certificates</li>



<li>Centralised expiry monitoring</li>



<li>Automated issuance and renewal workflows</li>



<li>A structured plan for algorithm transition</li>
</ul>



<p class="wp-block-paragraph">And without those fundamentals, talking about post-quantum migration is premature.</p>



<p class="wp-block-paragraph">You can’t modernise cryptography if you don’t even know where it’s deployed.</p>


<div class="wp-block-image">
<figure class="aligncenter size-full is-resized"><img loading="lazy" decoding="async" width="1000" height="563" class="wp-image-12796" style="aspect-ratio: 1.7762505782065685; width: 622px; height: auto;" src="http://www.netrust.net/wp-content/uploads/2026/04/shutterstock_662878741.jpg" alt="" srcset="https://www.netrust.net/wp-content/uploads/2026/04/shutterstock_662878741.jpg 1000w, https://www.netrust.net/wp-content/uploads/2026/04/shutterstock_662878741-300x169.jpg 300w, https://www.netrust.net/wp-content/uploads/2026/04/shutterstock_662878741-768x432.jpg 768w" sizes="auto, (max-width: 1000px) 100vw, 1000px" /></figure>
</div>


<div class="wp-block-spacer" style="height: 20px;" aria-hidden="true"> </div>



<h2 class="wp-block-heading"><strong>What Forward-Looking Organisations Are Doing</strong></h2>



<p class="wp-block-paragraph">The more mature organisations we observe are taking a phased approach:</p>



<p class="wp-block-paragraph"><strong>Step 1: Gain Full Certificate Visibility</strong></p>



<p class="wp-block-paragraph">Build a complete inventory across public websites, internal systems, cloud, containers, and load balancers.</p>



<p class="wp-block-paragraph"><strong>Step 2: Automate the Lifecycle</strong></p>



<p class="wp-block-paragraph">Move away from manual renewals. Integrate issuance and renewal into DevOps and infrastructure pipelines.</p>



<p class="wp-block-paragraph"><strong>Step 3: Design for Algorithm Flexibility</strong></p>



<p class="wp-block-paragraph">Ensure that certificate management systems are not tightly bound to a single algorithm. Prepare for hybrid (classical + PQC) deployments when standards stabilise.</p>



<p class="wp-block-paragraph"><strong>Step 4: Monitor Industry Signals</strong></p>



<p class="wp-block-paragraph">Track NIST PQC standardisation, browser support, root program policies, and regulatory guidance to be prepared.</p>



<h2 class="wp-block-heading"><strong>A Subtle but Important Shift</strong></h2>



<p class="wp-block-paragraph">Historically, SSL/TLS certificates were treated as point-in-time security artefacts. From now on, they need to be treated as continuously managed cryptographic assets.</p>



<p class="wp-block-paragraph">The 47-day timeline accelerates this.</p>



<p class="wp-block-paragraph">The post-quantum era makes it non-optional.</p>



<h2 class="wp-block-heading"><strong>Final Thought</strong></h2>



<p class="wp-block-paragraph">The organisations likely to struggle in the PQC transition are not those lacking quantum expertise.</p>



<p class="wp-block-paragraph">They’re the ones still managing certificates manually.</p>



<p class="wp-block-paragraph">If there’s one practical takeaway from both trends, it’s this:</p>



<p class="wp-block-paragraph">Before thinking about quantum-safe algorithms, make sure your certificate lifecycle is automated, visible, and crypto-agile. Everything else builds on that foundation.</p>



<p class="wp-block-paragraph">&nbsp;</p>



<p class="wp-block-paragraph">&nbsp;</p>



<p class="wp-block-paragraph">If you’re assessing your certificate lifecycle readiness or thinking about crypto agility, we’re always happy to share what we’re seeing across the industry. <a href="https://www.netrust.net/contact-us/" data-wpel-link="internal">Contact us</a> today.</p>



<p class="ai-optimize-26 wp-block-paragraph">Follow us on <a href="https://www.linkedin.com/company/netrust-pte-ltd" data-wpel-link="external" rel="external noopener noreferrer"><strong>LinkedIn</strong></a> for the latest happenings/updates.</p>
<p>The post <a href="https://www.netrust.net/blog/the-47-day-certificate-era-and-the-post-quantum-reality-are-we-ready/" data-wpel-link="internal">The 47-Day Certificate Era and the Post-Quantum Reality: Are We Ready?</a> appeared first on <a href="https://www.netrust.net" data-wpel-link="internal">Netrust</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Why Enterprises Need Secure Email Encryption</title>
		<link>https://www.netrust.net/blog/why-enterprises-need-secure-email-encryption/</link>
		
		<dc:creator><![CDATA[Kai Yong Wong]]></dc:creator>
		<pubDate>Wed, 25 Mar 2026 02:00:13 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[SSL Certificates]]></category>
		<guid isPermaLink="false">https://www.netrust.net/?p=12700</guid>

					<description><![CDATA[<p>Email remains one of the most widely used communication channels in the present enterprise environment and one of the most commonly targeted by attackers. While many organisations solely rely on SSL/TLS for protection of their email traffic, secure email encryption actually is more than just transport-layer protection. SSL/TLS encrypts data in transit, but it does not guarantee end-to-end Confidentiality, Integrity and</p>
<p>The post <a href="https://www.netrust.net/blog/why-enterprises-need-secure-email-encryption/" data-wpel-link="internal">Why Enterprises Need Secure Email Encryption</a> appeared first on <a href="https://www.netrust.net" data-wpel-link="internal">Netrust</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Email remains one of the most widely used communication channels in the present enterprise environment and one of the most commonly targeted by attackers. While many organisations solely rely on SSL/TLS for protection of their email traffic, secure email encryption actually is more than just transport-layer protection.</p>
<p>SSL/TLS encrypts data in transit, but it does not guarantee end-to-end Confidentiality, Integrity and Authenticity (CIA) once the email message reaches intermediate systems or the mail servers.</p>
<p>To have a secure email is to ensure that all sensitive information remains guarded throughout its entire lifecycle, from the moment it is sent out by the sender till the recipient opens it. With the increase in remote work, more stringent regulatory requirements and a growing number of data breaches, organisations must move beyond SSL/TLS encryption to achieve higher email security postures.</p>
<p>We will explore why SSL/TLS alone is never enough, and how organisations can strengthen email security postures by using comprehensive encryption strategies.</p>
<h2><img loading="lazy" decoding="async" class="alignnone size-full wp-image-12707" src="https://www.netrust.net/wp-content/uploads/2026/02/shutterstock_2685623263-1.jpg" alt="" width="500" height="334" srcset="https://www.netrust.net/wp-content/uploads/2026/02/shutterstock_2685623263-1.jpg 500w, https://www.netrust.net/wp-content/uploads/2026/02/shutterstock_2685623263-1-300x200.jpg 300w" sizes="auto, (max-width: 500px) 100vw, 500px" /></h2>
<p>Many believe that once email traffic is protected by SSL/TLS, the communication is secure. However, in reality, SSL/TLS only encrypts the part where the email is being transmitted between mail servers. So, once the email reaches a server, it will typically be decrypted and stored in plain text, making it vulnerable to attacks such as internal threats, compromised mailbox or server breaches.</p>
<p>A straightforward example would be sending a confidential letter in a locked courier truck and leaving it unsealed during storage in a warehouse. If adversaries gain access to the server, or if the emails are forwarded, archived or backed up, the original SSL/TLS encryption no longer applies.</p>
<p>As organisations increasingly exchange sensitive information such as contracts and financial data, only relying on SSL/TLS exposes them to compliance risks and data leakage. A stronger, more holistic email encryption approach is needed to address these gaps.</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-12705" src="https://www.netrust.net/wp-content/uploads/2026/02/shutterstock_2684318907.jpg" alt="" width="500" height="282" srcset="https://www.netrust.net/wp-content/uploads/2026/02/shutterstock_2684318907.jpg 500w, https://www.netrust.net/wp-content/uploads/2026/02/shutterstock_2684318907-300x169.jpg 300w" sizes="auto, (max-width: 500px) 100vw, 500px" /></p>
<ol>
<li>End-to-End Email Encryption</li>
</ol>
<p>Emails will be encrypted at the sender’s side, and remain encrypted till decryption is done by the recipient. This will ensure only the intended recipient can decrypt and read the email content, preventing others, including mail servers, from accessing the email content.</p>
<p>Modern email encryption solutions can integrate seamlessly with common platforms like Outlook and Gmail. For external recipients who do not use the same encryption system, secure methods such as email verification or one-time passcodes can be used to authenticate the recipient and allow secure decryption through a browser.</p>
<p>By encrypting the email message itself, rather than just the transmission channel, organisations can ensure total confidentiality of the email message from sender to recipient. This significantly reduces exposure to server-side breaches and insider threats.</p>
<ol start="2">
<li>Encryption at Rest</li>
</ol>
<p>Data at rest, such as archives and backups require encryption as well, to prevent attackers from gaining access to the mail server or storage system. This encrypted data remains unreadable without the proper keys for decryption.</p>
<ol start="3">
<li>Identity-Based Encryption and Key Management</li>
</ol>
<p>A combination of Identity-Based encryption, centrally managed key systems, and hardware security tokens to simplify key management. Associating keys with user identities while storing private keys in USB tokens that cannot be replicated will help to prevent unauthorised decryption and support secure user onboarding and offboarding.</p>
<ol start="4">
<li>Secure Email Gateways and Policy Enforcement</li>
</ol>
<p>Secure email gateway solutions with built-in Data Loss Prevention (DLP) capabilities help organisations enforce encryption policies automatically. These systems can inspect email content and apply encryption based on predefined rules.</p>
<p>For example, emails containing personal data (PII) or financial information can be automatically encrypted before being sent, whether to internal or external recipients. This reduces reliance on users to make security decisions and ensures consistent protection across the organisation.</p>
<p><strong>Best Practices / Tips</strong></p>
<ul>
<li><strong>Classify sensitive email content</strong> so encryption policies are applied automatically and consistently.</li>
<li><strong>Encrypt emails both in transit and at rest</strong> to cover the full data lifecycle.</li>
<li><strong>Secure external communications </strong>by integrating a third-party application for encrypted email exchanges with partners and customers with ease and usability.</li>
<li><strong>Centralise key management</strong> to reduce complexity and minimize human error.</li>
<li><strong>Audit and review DLP policies regularly</strong> to align with evolving threats and compliance requirements.</li>
</ul>
<p>Lastly, and the most important point:</p>
<ul>
<li><strong>Educate employees on </strong>the importance of email security to prevent data leakage.</li>
</ul>
<p>These recommended practices help organisations to maintain a strong email security posture without burning out users or IT teams.</p>
<h2>Conclusion</h2>
<p>SSL/TLS is an important foundation for email security, but it is no longer sufficient on its own. Organisations must adopt strong encryption strategies that protect data end-to-end, at rest and across all email workflows. With comprehensive encryption, organisations can reduce breach risks, strengthen compliance and build trust in digital communication.</p>
<p><a href="https://www.linkedin.com/company/netrust-pte-ltd/" data-wpel-link="external" rel="external noopener noreferrer">Netrust</a> has been a trusted cybersecurity partner and solutions provider since 1997. We have decades of experience in end-to-end cryptographic processes, including encryption and decryption. Every bit of experience we have builds up to the megabytes of confidence you can place in us. <a href="https://www.netrust.net/contact-us/" data-wpel-link="internal">Contact us</a> today for a consultation on your encryption needs.</p>
<h2></h2>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p class="ai-optimize-26">Follow us on <a href="https://www.linkedin.com/company/netrust-pte-ltd" data-wpel-link="external" rel="external noopener noreferrer"><strong>LinkedIn</strong></a> for the latest happenings/updates.</p>
<p>The post <a href="https://www.netrust.net/blog/why-enterprises-need-secure-email-encryption/" data-wpel-link="internal">Why Enterprises Need Secure Email Encryption</a> appeared first on <a href="https://www.netrust.net" data-wpel-link="internal">Netrust</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Your SSL Certificates Are About to Expire a Lot More Often. Here&#8217;s What That Means for Your Organisation.</title>
		<link>https://www.netrust.net/blog/your-ssl-certificates-are-about-to-expire-a-lot-more-often-heres-what-that-means-for-your-organisation/</link>
		
		<dc:creator><![CDATA[Eugene Lam – Deputy CEO, Netrust]]></dc:creator>
		<pubDate>Tue, 17 Mar 2026 06:05:32 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[SSL Certificates]]></category>
		<guid isPermaLink="false">https://www.netrust.net/?p=12737</guid>

					<description><![CDATA[<p>Earlier this year, a decision was “quietly” made that will create real operational headaches for most organisations — and a lot of people haven&#8217;t noticed yet. On 11 April 2025, the CA/Browser Forum — the industry body that governs SSL/TLS certificates — voted to progressively shorten certificate validity periods. The end point: a maximum of 47 days by 2029. The first</p>
<p>The post <a href="https://www.netrust.net/blog/your-ssl-certificates-are-about-to-expire-a-lot-more-often-heres-what-that-means-for-your-organisation/" data-wpel-link="internal">Your SSL Certificates Are About to Expire a Lot More Often. Here&#8217;s What That Means for Your Organisation.</a> appeared first on <a href="https://www.netrust.net" data-wpel-link="internal">Netrust</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Earlier this year, a decision was “quietly” made that will create real operational headaches for most organisations — and a lot of people haven&#8217;t noticed yet.</p>
<p>On 11 April 2025, the CA/Browser Forum — the industry body that governs SSL/TLS certificates — voted to progressively shorten certificate validity periods. The end point: a maximum of 47 days by 2029. The first milestone already hit this month.</p>
<p>For a change, I&#8217;m not writing this to sell or promote anything. I&#8217;m writing this because I&#8217;ve been in the PKI and digital security space for a long time, and I&#8217;ve seen how these kinds of changes catch organisations off guard when they&#8217;re buried in forum announcements and technical documentation that most business leaders never read.</p>
<p>So here&#8217;s the plain-English version.</p>
<h5><span style="text-decoration: underline;">What changed, and when</span></h5>
<p>Previously, organisations can obtain an SSL/TLS certificate valid for up to 398 days — a little over 13 months. That&#8217;s the window you have before you need to renew.</p>
<p>Under the new schedule approved by Apple&#8217;s proposal at the CA/Browser Forum, that window shrinks significantly:</p>
<table width="600">
<tbody>
<tr>
<td width="300"><strong>Maximum Certificate Lifespan</strong></td>
<td width="300"><strong>Effective Date</strong></td>
</tr>
<tr>
<td width="300">200 days</td>
<td width="300">15 March 2026</td>
</tr>
<tr>
<td width="300">100 days</td>
<td width="300">15 March 2027</td>
</tr>
<tr>
<td width="300">47 days</td>
<td width="300">15 March 2029</td>
</tr>
</tbody>
</table>
<p>The first cut — to 200 days — applies from 15 March 2026. That&#8217;s now.</p>
<p>If your organisation is renewing or issuing new certificates from this point forward, you&#8217;re already operating under the new rules.</p>
<h5><span style="text-decoration: underline;">Why did this happen?</span></h5>
<p>The reasoning is sound, even if the timing creates inconvenience. Shorter certificate lifespans reduce the window of exposure if a certificate is ever compromised. If an attacker gets hold of a certificate, a 47-day lifespan limits how long they can exploit it.</p>
<p>There&#8217;s also a push to get organisations away from manual, &#8216;set it and forget it&#8217; approaches to certificate management — which, frankly, most organisations still rely on.</p>
<blockquote><p><em>The industry is essentially forcing automation. The question is whether your organisation is ready for it.</em></p></blockquote>
<h5><span style="text-decoration: underline;">What this means at the leadership level</span></h5>
<p>Most of us as leaders are not the ones managing certificates day to day. That sits with your IT or security team. But the decisions that come out of this change will land on your desk — because the response options each carry trade-offs that go beyond the technical.</p>
<p>The math is straightforward. If your organisation manages 50 certificates today and renews them once a year, that is roughly 50 renewal actions annually. At 47-day validity, the same estate requires close to 400 renewal actions a year. Some teams, when they hear this, immediately ask: can we just hire more people to handle the increased frequency?</p>
<p>It is a fair instinct, but it misses the real problem. The issue is not volume alone — it is complexity and visibility. Certificates are often reused across multiple systems. It is not best practice, but it happens, and it happens a lot. When that is the case, a single certificate expiring does not just affect one service. It can cascade across everything it was deployed to — and the team may not even know where all the instances are.</p>
<p>Most certificate-related outages I have seen are not due to malicious/lazy administrators. They happen because a certificate was tracked in a spreadsheet or an internal document, got buried in a long list, and either was missed entirely or was renewed in one place but not updated everywhere it was deployed. Adding headcount to a manual process does not eliminate that risk — it just means more people are working from the same incomplete picture.</p>
<blockquote><p><em>The question to ask your team is not “do we have enough people?” It is “do we have full visibility of every certificate we own, and do we know everywhere each one is deployed?” If the honest answer is no, that is the gap to close first.</em></p></blockquote>
<h5><span style="text-decoration: underline;">My own experience trying to automate this</span></h5>
<p>I want to share something candidly, because I think it is more useful than giving advice I have not personally tested.</p>
<p>Netrust is not a large organisation. We are not a bank with a dedicated security operations team of fifty people. And even so, pushing for automation internally has not been straightforward. Automating anything requires people to change how they work — and change is uncomfortable, even when everyone agrees it is the right direction. There are internal inertias to work through, legacy processes to untangle, and moments where it feels easier to just keep doing things the old way.</p>
<p>I share this not to paint a bleak picture, but because I think leaders who are navigating this need to go in with realistic expectations. Automation is the right answer. Getting there requires someone at the top to hold the line on it — because the path of least resistance will always be to patch things manually and move on.</p>
<p>Interestingly, a recent review with my team surfaced something worth noting. It is actually the smaller, more nimble organisations that are showing the most eagerness to move on this. Perhaps because they have fewer legacy systems to untangle, or because the decision chain is shorter — but whatever the reason, they are not waiting. If anything, that should give the larger organisations pause.</p>
<p>If you are a CIO or CISO reading this, this is your initiative to champion — not to delegate and forget. The organisations that will handle the 2027 and 2029 milestones well are the ones where someone at the leadership level decided early that manual was not good enough.</p>
<h5><span style="text-decoration: underline;">What good looks like</span></h5>
<p>The answer is not a product — it is a capability. The organisations that will navigate this well are the ones that have moved from reactive to systematic. Certificates should not be something your team scrambles to deal with. They should be something your infrastructure handles on its own, with your team only stepping in when something genuinely needs attention.</p>
<p>When I think about what that looks like in practice, I would ask four questions of any approach your team puts forward:</p>
<ul>
<li>Can we see every certificate we own, across every system, in one place — without someone having to compile a spreadsheet?</li>
<li>Does renewal happen automatically, well before expiry — or does the process only start when someone notices a reminder?</li>
<li>When a certificate is renewed, is it updated everywhere it is deployed — or just in the place someone remembered to check?</li>
<li>If something looks anomalous or falls outside policy, does the team find out proactively — or after something breaks?</li>
</ul>
<p>If the honest answer to any of those is “we are not sure” or “it depends on who is on duty” — that is where the conversation with your team needs to start. This is not just a technical decision. It is an operational resilience decision. The CIO or CISO who surfaces this to the board before something breaks is in a very different position from the one who has to explain an outage.</p>
<h5><span style="text-decoration: underline;">Signing off — for now</span></h5>
<p>I have been speaking with peers across sectors — education, government, financial services — and the pattern is consistent. Most organisations know something is changing. Not many have sat down to work out what it actually means for their environment, their team, and their processes.</p>
<p>I am happy to share my own journey on this — the decisions we made, the pitfalls we hit, what I would do differently — over coffee or when we cross paths at industry gatherings. These are the conversations I find most useful, and I suspect others do too.</p>
<p>Till the next time we meet.</p>
<blockquote><p><strong>Eugene Lam </strong>is Deputy CEO of Netrust, Singapore&#8217;s only IMDA-accredited Certificate Authority and Asia&#8217;s first public CA. Netrust has been helping organisations manage PKI and digital certificates since 1997.</p></blockquote>
<pre><strong>Reference: </strong>CA/Browser Forum Ballot SC-081v3 · cabforum.org/2025/04/11/ballot-sc081v3-introduce-schedule-of-reducing-validity-and-data-reuse-periods/</pre>
<p>The post <a href="https://www.netrust.net/blog/your-ssl-certificates-are-about-to-expire-a-lot-more-often-heres-what-that-means-for-your-organisation/" data-wpel-link="internal">Your SSL Certificates Are About to Expire a Lot More Often. Here&#8217;s What That Means for Your Organisation.</a> appeared first on <a href="https://www.netrust.net" data-wpel-link="internal">Netrust</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Why Certificate Renewals Fail in Enterprise Environments</title>
		<link>https://www.netrust.net/blog/why-certificate-renewals-fail-in-enterprise-environments/</link>
		
		<dc:creator><![CDATA[Guo Jie]]></dc:creator>
		<pubDate>Thu, 12 Mar 2026 02:00:02 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[SSL Certificates]]></category>
		<guid isPermaLink="false">https://www.netrust.net/?p=12716</guid>

					<description><![CDATA[<p>With certificate automation, renewal is no longer a concern for the enterprise. The assumption is that this service, once configured, will renew certificates quietly in the background and will continue to work as expected. Unfortunately, this case is not always true. In real-world environments, certificate renewal may seem completed from the issuing CA’s perspective. This does not guarantee successful provisioning, which</p>
<p>The post <a href="https://www.netrust.net/blog/why-certificate-renewals-fail-in-enterprise-environments/" data-wpel-link="internal">Why Certificate Renewals Fail in Enterprise Environments</a> appeared first on <a href="https://www.netrust.net" data-wpel-link="internal">Netrust</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>With certificate automation, renewal is no longer a concern for the enterprise. The assumption is that this service, once configured, will renew certificates quietly in the background and will continue to work as expected. Unfortunately, this case is not always true.</p>
<p>In real-world environments, certificate renewal may seem completed from the issuing CA’s perspective. This does not guarantee successful provisioning, which may result in application failures, service outages, or authorisation issues. Such issues might not be detected immediately. They are usually detected only after a service or server restart activity or routine maintenance. This adds more pressure to the maintenance team for remediation.</p>
<p>The cause of the certificate renewal failure is usually not due to the certificate itself. They are caused by dependencies around keys, permissions, trust chains and system integration. This post shares some of the common reasons for the certificate renewal failure and what teams should pay attention to when the certificate renewal is operated at scale.</p>
<h2><img loading="lazy" decoding="async" class="alignnone wp-image-12721 size-full" src="https://www.netrust.net/wp-content/uploads/2026/03/shutterstock_1625401915-1.jpg" alt="" width="500" height="361" srcset="https://www.netrust.net/wp-content/uploads/2026/03/shutterstock_1625401915-1.jpg 500w, https://www.netrust.net/wp-content/uploads/2026/03/shutterstock_1625401915-1-300x217.jpg 300w" sizes="auto, (max-width: 500px) 100vw, 500px" /></h2>
<h2>The complexity behind certificate renewal</h2>
<p>In theory, certificate renewal sounds straightforward: replacing an expiring certificate with a new certificate.  However, certificates in enterprise environments usually contain dependencies. They are tied to private keys, service identities, HSMs, load balancers, databases, and multiple downstream systems.</p>
<p>Renewing a certificate not only updates the certificate information. A new key pair may be generated, permission may be re-evaluated, or the trust chain may differ, especially when the issuer changed. Those changes do not always cause immediate failure, and this makes them more difficult to detect during routine checks.</p>
<h2><img loading="lazy" decoding="async" class="alignnone wp-image-12720 size-full" src="https://www.netrust.net/wp-content/uploads/2026/03/shutterstock_2342385275.jpg" alt="" width="500" height="334" srcset="https://www.netrust.net/wp-content/uploads/2026/03/shutterstock_2342385275.jpg 500w, https://www.netrust.net/wp-content/uploads/2026/03/shutterstock_2342385275-300x200.jpg 300w" sizes="auto, (max-width: 500px) 100vw, 500px" /></h2>
<h2>Common Causes of Certificate Renewal Failures</h2>
<ol>
<li><strong> Key Pair Changes Are Not Fully Understood</strong></li>
</ol>
<p>A very common cause for the failure is whether the renewal reuses the existing key pair or generates a new one. This distinction matters, especially during the troubleshooting phase.</p>
<p>When a certificate is used for encryption, signing or database protection, changing the key pair can have downstream effects. Data encrypted with the old key still requires the old key for operation and accessibility. In an environment where an HSM is used to store the private key, key lifecycle management becomes even more crucial due to strict access controls and policies.</p>
<ol start="2">
<li><strong> Private Key Access Breaks After Renewal</strong></li>
</ol>
<p>It is not uncommon for certificates to renew successfully while applications fail to access the private key afterwards. This often comes down to service accounts, identity mappings, or permission changes that occur during renewal.</p>
<p>These issues frequently appear only after a restart or failover, when services attempt to rebind to the key. At that point, troubleshooting becomes more difficult, especially in production environments with tight recovery timelines.</p>
<ol start="3">
<li><strong> Trust Chain Differences Are Overlooked</strong></li>
</ol>
<p>If the full trust chain isn&#8217;t updated across the environment, renewed certificates may fail validation. Client or upstream components may reject the certificate even if this certificate is technically valid.</p>
<p>This is a very common issue in environments where Strict TLS validation is imposed, or where multiple network layers, such as load balancers and reverse proxies, exist.</p>
<ol start="4">
<li><strong> Automation Focuses on Issuance, Not Validation</strong></li>
</ol>
<p>In large environments, automation services usually focus on certificate issuance. While logs may confirm a successful renewal, they do not verify that the application has successfully adopted the updated certificate. A mandated post-renewal validation should be in place. This process checks the active binding, key access, or live TLS handshakes. Those issues may remain hidden until the next operational event triggers a failure.</p>
<ol start="5">
<li><strong> Renewals Are Not Tested Under Operational Scenarios</strong></li>
</ol>
<p>Certificate renewals are usually validated only under normal conditions. During failovers, patching exercises or disaster recovery, it is usually overlooked or tested superficially.</p>
<p>As a result, the certificate renewal process that seems reliable during day-to-day operation may fail when the system is under stress. These are precisely the moments when certificate-related issues cause the most impact.</p>
<p>&nbsp;</p>
<p><strong><img loading="lazy" decoding="async" class="alignnone size-full wp-image-12727" src="https://www.netrust.net/wp-content/uploads/2026/03/shutterstock_2525276527.jpg" alt="" width="500" height="334" srcset="https://www.netrust.net/wp-content/uploads/2026/03/shutterstock_2525276527.jpg 500w, https://www.netrust.net/wp-content/uploads/2026/03/shutterstock_2525276527-300x200.jpg 300w" sizes="auto, (max-width: 500px) 100vw, 500px" /></strong></p>
<p><strong>Practical Considerations for Enterprise Teams</strong></p>
<p>From an operational perspective, a few practices consistently help reduce renewal-related issues:</p>
<ul>
<li>Be explicit about whether renewals reuse existing keys or generate new ones.</li>
<li>Always verify private key access after renewal, not just certificate presence.</li>
<li>Ensure intermediate certificates and trust chains are deployed consistently.</li>
<li>Monitor both renewal status and deployment success.</li>
<li>Test renewals during restarts, failovers, and planned maintenance windows.</li>
</ul>
<p>These steps do not eliminate complexity, but they significantly reduce surprises.</p>
<p><strong>Conclusion</strong></p>
<p>In the enterprise environment, certificate renewal is rarely due solely to expired certificates. They are usually the result of hidden dependencies across keys, permissions, identities and trusted chains. Automation helps, but it does not replace the need for visibility and validation. At least for now.</p>
<p>When a certificate renewal is managed as part of a full lifecycle rather than as background tasks, outages can be reduced, avoided, and prevented. This becomes more important as the enterprise environment scales and increases in complexity. In addition, with the shortening of the TLS certificate to 47 days, the renewal frequency increased significantly. This greatly reduced the response time for manual intervention, ad-hoc troubleshooting or operational error. As such, a more robust automation, proper lifecycle management and end-to-end validation should be in place for the certificate renewal process. <a href="https://www.netrust.net/contact-us/" data-wpel-link="internal">Contact us</a> today for a consultation today.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p class="ai-optimize-26">Follow us on <a href="https://www.linkedin.com/company/netrust-pte-ltd" data-wpel-link="external" rel="external noopener noreferrer"><strong>LinkedIn</strong></a> for the latest happenings/updates.</p>
<p>The post <a href="https://www.netrust.net/blog/why-certificate-renewals-fail-in-enterprise-environments/" data-wpel-link="internal">Why Certificate Renewals Fail in Enterprise Environments</a> appeared first on <a href="https://www.netrust.net" data-wpel-link="internal">Netrust</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Explaining Encryption through real world examples</title>
		<link>https://www.netrust.net/blog/explaining-encryption-through-real-world-examples/</link>
		
		<dc:creator><![CDATA[Lai Yong Xing]]></dc:creator>
		<pubDate>Thu, 26 Feb 2026 02:00:18 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Digital Signing]]></category>
		<guid isPermaLink="false">https://www.netrust.net/?p=12665</guid>

					<description><![CDATA[<p>Are you trying to implement or are you trying to understand Encryption from scratch? Or does your brain feel like scrambled eggs after trying to understand how S-boxes work in the AES algorithm with GCM mode? In this article, we aim to explain Encryption by using real life objects and examples to bridge the concept to reality. Let’s start with a</p>
<p>The post <a href="https://www.netrust.net/blog/explaining-encryption-through-real-world-examples/" data-wpel-link="internal">Explaining Encryption through real world examples</a> appeared first on <a href="https://www.netrust.net" data-wpel-link="internal">Netrust</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Are you trying to implement or are you trying to understand Encryption from scratch? Or does your brain feel like scrambled eggs after trying to understand how S-boxes work in the AES algorithm with GCM mode? In this article, we aim to explain Encryption by using real life objects and examples to bridge the concept to reality.</p>
<p>Let’s start with a primer video, where we will use letter wax seals to demonstrate what a digital signature is.</p>
<p><iframe loading="lazy" title="Explaining Digital Signatures Through Real World Examples" width="1140" height="641" src="https://www.youtube.com/embed/Bu3PF4Wxsjc?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>Now that you know what encryption is, let’s fill in the remaining information you will need to know to work with it. Don’t worry if the rest of the article seems technical, you just need to know enough to select the most suitable components for your use case.</p>
<h2>Use Cases and Algorithms</h2>
<p>There are two types of encryption algorithms, symmetric and asymmetric. For ease of understanding, symmetric algorithms use the same key for encryption and decryption, whereas asymmetric algorithms use a key pair instead. A key pair (consisting of a “private key” and “public key”) can be imagined as a digital conjoined twin, tightly bound to each other at birth, with one half used for encryption and the other half for decryption.</p>
<p>They are suitable for different purposes. When considering encryption, it is recommended to start with a symmetric algorithm as the base. They are fast and can handle any amount of data.</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-12668" src="https://www.netrust.net/wp-content/uploads/2026/02/Symmtric-Key-Data.png" alt="" width="441" height="189" srcset="https://www.netrust.net/wp-content/uploads/2026/02/Symmtric-Key-Data.png 441w, https://www.netrust.net/wp-content/uploads/2026/02/Symmtric-Key-Data-300x129.png 300w" sizes="auto, (max-width: 441px) 100vw, 441px" /></p>
<p>This approach is typically enough for most use cases where the intention is to encrypt data to transfer to the archive, or to another internal application. It is expected that the internal application will have the means to use the same key or a securely shared copy of it to decrypt the data.</p>
<p>For transfer to external parties, the same approach could technically work so long as the key can be securely and secretly shared with the external party. It would not do, for example, to send the key via email. Alternatively, asymmetric algorithms would serve well in this scenario.</p>
<p><strong><img loading="lazy" decoding="async" class="alignnone size-full wp-image-12669" src="https://www.netrust.net/wp-content/uploads/2026/02/Encrytion-Decryption-Key-Data.png" alt="" width="489" height="446" srcset="https://www.netrust.net/wp-content/uploads/2026/02/Encrytion-Decryption-Key-Data.png 489w, https://www.netrust.net/wp-content/uploads/2026/02/Encrytion-Decryption-Key-Data-300x274.png 300w" sizes="auto, (max-width: 489px) 100vw, 489px" /></strong></p>
<p>This approach covers the remaining use cases in which encrypted data needs to be sent out. You will need to get hold of the recipient’s public key or digital certificate if they have it. Yes, it is the same digital certificate used for digital signatures.</p>
<p>Now, which actual algorithm do we go with? Typical industry standard is to use the best open standard algorithm at the time, which is AES for symmetric and RSA/ECC for asymmetric at the point of writing. These algorithms have been thoroughly analysed by the community. Do avoid the trap of thinking of using an obscure or custom algorithm, they add risk without necessarily adding strength to the equation.</p>
<p>Also, ensure that some crypto mode is used together with the symmetric algorithm. The strongest available today unencumbered by patents, is GCM. If some of the legacy components in the ecosystem are unable to handle that, CBC is a good fallback. Do avoid ECB as that is effectively running without a mode.</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-12670" src="https://www.netrust.net/wp-content/uploads/2026/02/ECB-Image.png" alt="" width="602" height="290" srcset="https://www.netrust.net/wp-content/uploads/2026/02/ECB-Image.png 602w, https://www.netrust.net/wp-content/uploads/2026/02/ECB-Image-300x145.png 300w" sizes="auto, (max-width: 602px) 100vw, 602px" /></p>
<p>The reason is best explained by this image from Wikipedia <sup>[1]</sup>. Modes add some jitter into the process so that each time the encryption process is run, different results are produced with the same source data. Yet it is still able to decrypt back to the original source data.</p>
<h2>Key Generation and Storage</h2>
<p>We have talked about the keys used in symmetric algorithms above. Needless to say, it should be securely generated using a secure random byte generator and access to it should be restricted except for the application doing the cryptographic processes.</p>
<p>The keys need to be rolled over periodically as well. This means old keys are archived (not deleted!) and new keys generated to use on future data encryption. As the encrypted data needs to be accessible in the future, the old keys need to be stored for as long as the data remains in the picture. In some use cases we have seen, this could be 7 years, or as long as 99 years.</p>
<p>For the best security it is recommended to generate and retain the key within a <a href="https://www.netrust.net/blog/what-is-a-hardware-security-module-hsm/" data-wpel-link="internal">Hardware Security Module (HSM)</a> as it provides both the generation and storage facilities in one hardware package. There are also means to securely backup and restore the keys in the event of disaster recovery or migration to other environments. If your application is on Cloud, there are HSM equivalents or Key Management Services (KMS) which serve a similar role on the major Cloud providers.</p>
<p>For asymmetric algorithms this is not an issue, as public keys or digital certificates are designed to be shared to the party that wishes to encrypt data for you.</p>
<h2>Implementation and Applications</h2>
<p>Theory is all fine and dandy, but the devil is in the (implementation) details. Cryptography is one of those things where one critical misstep could render the process meaningless. For example, if the encryption key is sent out via an insecure process, it compromises all past and future data encrypted using that particular key.</p>
<p>There are off the shelf applications that can handle the encryption process, but these typically only cover a specific use case or ecosystem. One example is email encryption (<a href="https://www.netrust.net/blog/secure-email-with-s-mime/" data-wpel-link="internal">S/MIME</a>) through Microsoft Outlook.</p>
<p>For other cases, especially if encryption is required for your application’s data, a custom solution should be expected. This may use an existing cryptographic API product or library, or may be made to measure entirely.</p>
<h2>Conclusion</h2>
<p>There is a lot more to know under the hood, but contrary to common belief, you do not need to know everything to work with data encryption. What we have laid out above should be sufficient to get you started, though it is strongly recommended to seek a consultation to determine the best solution for your requirements. We are also including answers to some frequently asked questions below that we have encountered before.</p>
<p><a href="https://www.linkedin.com/company/netrust-pte-ltd/" data-wpel-link="external" rel="external noopener noreferrer">Netrust</a> has been a trusted cybersecurity partner and solutions provider since 1997. We have decades of experience in end-to-end cryptographic processes, including encryption and decryption. Every bit of experience we have builds up to the megabytes of confidence you can place in us. <a href="https://www.netrust.net/contact-us/" data-wpel-link="internal">Contact us</a> today for a consultation on your encryption needs.</p>
<h2></h2>
<p>&nbsp;</p>
<h2>FAQs</h2>
<ul>
<li>Can I encrypt just a section of the data?</li>
</ul>
<p>Certainly. Off the shelf applications would not support this, though so the custom implementation would have to be able to cut, encrypt and piece the data blocks back together as required.</p>
<ul>
<li>I have already encrypted a file, but then I lost my key/token! What should I do?</li>
</ul>
<p>The first step is to determine how the key/token was lost. If there are reasonable grounds to believe it has been compromised, you will need to assume that all data encrypted with the lost key is compromised and respond in accordance with your country&#8217;s data privacy guidelines, such as the PDPA.</p>
<p>If the key is not compromised, you can look into restoring the key from backup. This should already be defined in the disaster recovery procedures before the system goes live. If the keys are not backed up or cannot be restored, then access to the data is effectively lost.</p>
<p>There is no convenient backdoor to restore access, this is exactly how cryptographic systems are intended to work.</p>
<ul>
<li>Can someone else see the data?</li>
</ul>
<p>No, encrypted data is effectively scrambled. The only way anyone can see the original data is if they know the correct algorithm, modes, and processes that the file is encrypted through, and have the correct key to run said decryption process.</p>
<ul>
<li>I am sending the data to an external party; how can they confirm that this data came from me?</li>
</ul>
<p>Encryption does not carry the sender’s identity. To achieve this, the data can be digitally signed first before it is encrypted and sent. The digital signature (Read up more on our article on <a href="https://www.netrust.net/blog/explaining-digital-signatures-through-real-world-objects/" data-wpel-link="internal">Explaining Digital Signatures through real world examples</a>) will carry the sender’s identity.</p>
<ul>
<li>Can digital signatures and encryption be used together?</li>
</ul>
<p>Certainly, they are not mutually exclusive.</p>
<ul>
<li>Can someone else tamper with the data?</li>
</ul>
<p>It is not possible to edit the data without corrupting the original. What that means is once edited, decryption can still be attempted, but the original data cannot be reconstructed. What is likely to emerge would be gibberish data.</p>
<p>&nbsp;</p>
<p>Reference table on the differences between Digital Signatures and Encryption.</p>
<p><img loading="lazy" decoding="async" class="alignnone size-large wp-image-12671" src="https://www.netrust.net/wp-content/uploads/2026/02/Digital-Signatures-and-Encryption-1024x536.png" alt="" width="1024" height="536" srcset="https://www.netrust.net/wp-content/uploads/2026/02/Digital-Signatures-and-Encryption-1024x536.png 1024w, https://www.netrust.net/wp-content/uploads/2026/02/Digital-Signatures-and-Encryption-300x157.png 300w, https://www.netrust.net/wp-content/uploads/2026/02/Digital-Signatures-and-Encryption-768x402.png 768w, https://www.netrust.net/wp-content/uploads/2026/02/Digital-Signatures-and-Encryption.png 1350w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></p>
<pre>[1] Image source: https://en.wikipedia.org/wiki/Block_cipher_mode_of_operation#ECB</pre>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p class="ai-optimize-26">Follow us on <a href="https://www.linkedin.com/company/netrust-pte-ltd" data-wpel-link="external" rel="external noopener noreferrer"><strong>LinkedIn</strong></a> for the latest happenings/updates.</p>
<p>The post <a href="https://www.netrust.net/blog/explaining-encryption-through-real-world-examples/" data-wpel-link="internal">Explaining Encryption through real world examples</a> appeared first on <a href="https://www.netrust.net" data-wpel-link="internal">Netrust</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Secure Your Future: A Guide to Unified Application and AI Security</title>
		<link>https://www.netrust.net/blog/secure-your-future-a-guide-to-unified-application-and-ai-security/</link>
		
		<dc:creator><![CDATA[Charles Huang]]></dc:creator>
		<pubDate>Thu, 12 Feb 2026 03:45:13 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<guid isPermaLink="false">https://www.netrust.net/?p=12655</guid>

					<description><![CDATA[<p>Guest Contributor, Charles Huang, Co-Founder &#38; COO of Scantist In today’s digital-first world, the line between application development and AI integration has vanished. While this fusion drives innovation, it also creates a complex and expanded attack surface. How can organizations protect their software without slowing down progress? The answer lies in a unified approach to application security. Traditional, siloed tools are</p>
<p>The post <a href="https://www.netrust.net/blog/secure-your-future-a-guide-to-unified-application-and-ai-security/" data-wpel-link="internal">Secure Your Future: A Guide to Unified Application and AI Security</a> appeared first on <a href="https://www.netrust.net" data-wpel-link="internal">Netrust</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>Guest Contributor, Charles Huang, Co-Founder &amp; COO of Scantist</strong></p>
<p>In today’s digital-first world, the line between application development and AI integration has vanished. While this fusion drives innovation, it also creates a complex and expanded attack surface. How can organizations protect their software without slowing down progress? The answer lies in a unified approach to <strong>application security</strong>. Traditional, siloed tools are no longer enough to manage the intertwined risks of open-source dependencies, code vulnerabilities, and the unique threats targeting AI models. A modern security strategy requires a holistic platform that provides end-to-end visibility and control.</p>
<p>Now that you know what a digital signature is, let’s fill in the remaining information you will need to know to work with it.</p>
<h2><strong>The Challenge: Why Traditional Security Falls Short</strong></h2>
<p>Many IT teams today are playing a constant game of catch-up. They use one tool for scanning open-source libraries (SCA), another for analyzing their own code (SAST), a third to protect their new AI features, and perhaps manual consultants for periodic penetration testing. This fragmented approach is like trying to assemble a car with four different sets of instructions—it’s inefficient, creates blind spots, and leaves critical connections unsecured. The reality is that a vulnerability in a third-party library can be exploited to poison an AI model, or a weak API can expose sensitive data through a generative AI chatbot.</p>
<p>This complexity leads to several common problems:</p>
<ul>
<li><strong>Vulnerability Overload:</strong> Teams are flooded with alerts from multiple tools, with no clear way to prioritize what truly matters.</li>
<li><strong>Siloed Visibility:</strong> Security, development, and operations teams lack a shared understanding of risk across the application lifecycle.</li>
<li><strong>Emerging AI Threats:</strong> Traditional firewalls and scanners are not designed to detect prompt injection, model manipulation, or data leakage from Large Language Models (LLMs).</li>
<li><strong>Manual Bottlenecks:</strong> Periodic, manual security tests can’t keep pace with rapid development cycles, leaving new features exposed.</li>
</ul>
<h2><strong>The Solution: A Three-Layered Security Strategy</strong></h2>
<p>To address these challenges effectively, organizations need an integrated platform that secures the entire digital ecosystem. This involves a three-layered approach that covers the software supply chain, the AI models themselves, and proactive threat discovery. Scantist delivers this through its unified suite of AI-driven solutions.</p>
<h3><strong>1. Secure Your Foundation: AppDefender for DevSecOps</strong></h3>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-12660" src="https://www.netrust.net/wp-content/uploads/2026/02/Secure-Your-Foundation-AppDefender-for-DevSecOps.jpg" alt="" width="624" height="341" srcset="https://www.netrust.net/wp-content/uploads/2026/02/Secure-Your-Foundation-AppDefender-for-DevSecOps.jpg 624w, https://www.netrust.net/wp-content/uploads/2026/02/Secure-Your-Foundation-AppDefender-for-DevSecOps-300x164.jpg 300w" sizes="auto, (max-width: 624px) 100vw, 624px" /></p>
<p>Everything starts with the code and its dependencies. Before you can secure your AI, you must secure the application it lives in. <strong>AppDefender</strong>, Scantist’s flagship DevSecOps platform, provides a solid foundation by securing your entire software supply chain.</p>
<ul>
<li><strong>What it is:</strong> A comprehensive platform that combines Software Composition Analysis (SCA), Static Application Security Testing (SAST), and deep binary analysis.</li>
<li><strong>Why it matters:</strong> It gives you a single pane of glass to manage open-source governance, identify vulnerabilities in your own code, and ensure the integrity of your software from the first line of code to the final build. By automating DevSecOps orchestration and real-time SBOM management, it eliminates security noise and allows developers to focus on fixing what matters.</li>
</ul>
<h3><strong>2. Protect Your AI: AIDefender for LLM Security</strong></h3>
<p><img loading="lazy" decoding="async" class="alignnone size-large wp-image-12659" src="https://www.netrust.net/wp-content/uploads/2026/02/Protect-Your-AI-AIDefender-for-LLM-Security-1024x576.png" alt="" width="1024" height="576" srcset="https://www.netrust.net/wp-content/uploads/2026/02/Protect-Your-AI-AIDefender-for-LLM-Security-1024x576.png 1024w, https://www.netrust.net/wp-content/uploads/2026/02/Protect-Your-AI-AIDefender-for-LLM-Security-300x169.png 300w, https://www.netrust.net/wp-content/uploads/2026/02/Protect-Your-AI-AIDefender-for-LLM-Security-768x432.png 768w, https://www.netrust.net/wp-content/uploads/2026/02/Protect-Your-AI-AIDefender-for-LLM-Security.png 1300w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></p>
<p>Once your application foundation is secure, the next layer is to protect the AI models and agents running on it. Generative AI introduces novel risks that require specialized defenses. <strong>AIDefender</strong> is purpose-built to be the security gateway for your enterprise AI.</p>
<ul>
<li><strong>What it is:</strong> A dedicated <strong>AI security</strong> solution that protects against emerging threats targeting LLMs and generative AI tools.</li>
<li><strong>Why it matters:</strong> AIDefender prevents prompt injection attacks, detects and blocks sensitive data leakage, and monitors for model manipulation or poisoning. It ensures your AI implementations remain secure and compliant with evolving governance frameworks, allowing you to innovate with confidence.</li>
</ul>
<h3><strong>3. Think Like an Attacker: PAIStrike for Automated Penetration Testing</strong></h3>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-12658" src="https://www.netrust.net/wp-content/uploads/2026/02/Think-Like-an-Attacker-PAIStrike-for-Automated-Penetration-Testing.png" alt="" width="624" height="307" srcset="https://www.netrust.net/wp-content/uploads/2026/02/Think-Like-an-Attacker-PAIStrike-for-Automated-Penetration-Testing.png 624w, https://www.netrust.net/wp-content/uploads/2026/02/Think-Like-an-Attacker-PAIStrike-for-Automated-Penetration-Testing-300x148.png 300w" sizes="auto, (max-width: 624px) 100vw, 624px" /></p>
<p>The final layer is to shift from a defensive posture to a proactive one. Instead of waiting for attackers to find your weaknesses, you need to find them first. <strong>PAIStrike</strong> revolutionizes this process with its automated, AI-powered penetration testing.</p>
<ul>
<li><strong>What it is:</strong> An intelligent “red team” tool that uses multi-agent AI to automatically perform end-to-end penetration testing, just like a professional hacker.</li>
<li><strong>Why it matters:</strong> PAIStrike runs 24/7, continuously searching for vulnerabilities across your network, code, and infrastructure. It automates reconnaissance, vulnerability assessment, and exploit simulation, providing a true understanding of your security posture from an attacker’s perspective.</li>
</ul>
<h2><strong>Best Practices for Holistic Security</strong></h2>
<p>Adopting these tools is the first step. To ensure lasting success, integrate them with a security-first mindset. Here are a few best practices:</p>
<ul>
<li><strong>Shift Security Left, and Right:</strong> Integrate security checks early in the development process with AppDefender, but also continuously test your live environment with PAIStrike.</li>
<li><strong>Embrace Full-Stack Visibility:</strong> Use a unified platform to connect the dots between a vulnerability in a library, a risk in an AI model, and a potential exploit path.</li>
<li><strong>Automate Everything You Can:</strong> From SBOM generation to compliance reporting and penetration testing, automation frees up your team to focus on strategic risk reduction.</li>
<li><strong>Treat AI as a Unique Domain:</strong> Recognize that securing AI is not the same as securing a traditional application. Deploy specialized defenses like AIDefender.</li>
</ul>
<h2><strong>Conclusion &amp; Call to Action</strong></h2>
<p>In the age of AI, a fragmented security strategy is a losing one. Protecting your digital ecosystem requires a unified, intelligent, and proactive approach. By securing your software supply chain, protecting your AI implementations, and continuously testing your defenses, you can build true digital resilience.</p>
<p>Ready to simplify your security and focus on what matters? <a href="https://scantist.com/" data-wpel-link="external" rel="external noopener noreferrer"><strong>Contact Scantist today to learn how our unified platform can protect your applications and AI.</strong></a></p>
<p>The post <a href="https://www.netrust.net/blog/secure-your-future-a-guide-to-unified-application-and-ai-security/" data-wpel-link="internal">Secure Your Future: A Guide to Unified Application and AI Security</a> appeared first on <a href="https://www.netrust.net" data-wpel-link="internal">Netrust</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Explaining Digital Signatures Through Real World Objects</title>
		<link>https://www.netrust.net/blog/explaining-digital-signatures-through-real-world-objects/</link>
		
		<dc:creator><![CDATA[Lai Yong Xing]]></dc:creator>
		<pubDate>Thu, 29 Jan 2026 03:00:20 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Digital Signing]]></category>
		<guid isPermaLink="false">https://www.netrust.net/?p=12567</guid>

					<description><![CDATA[<p>Are you trying to work with or are you trying to understand Digital Signatures from scratch? Or have you attended meetings with vendors where jargon and acronyms like PKI, X509, RSA/ECDSA get thrown around like chaff and cause your brain to overheat? In this article, we aim to explain Digital Signatures by using real life objects and examples to bridge the</p>
<p>The post <a href="https://www.netrust.net/blog/explaining-digital-signatures-through-real-world-objects/" data-wpel-link="internal">Explaining Digital Signatures Through Real World Objects</a> appeared first on <a href="https://www.netrust.net" data-wpel-link="internal">Netrust</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Are you trying to work with or are you trying to understand Digital Signatures from scratch? Or have you attended meetings with vendors where jargon and acronyms like PKI, X509, RSA/ECDSA get thrown around like chaff and cause your brain to overheat? In this article, we aim to explain Digital Signatures by using real life objects and examples to bridge the concept to reality.</p>
<p>Let’s start with a primer video, where we will use letter wax seals to demonstrate what a digital signature is.</p>
<p><iframe loading="lazy" title="Explaining Digital Signatures Through Real World Examples" width="1140" height="641" src="https://www.youtube.com/embed/Bu3PF4Wxsjc?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>Now that you know what a digital signature is, let’s fill in the remaining information you will need to know to work with it.</p>
<h5>Use Cases</h5>
<p>In our experience, most use cases revolve around document agreements and thus PDF signing. In fact, digital signatures can be regarded as the next evolutionary step up from electronic signatures, which itself has evolved from handwritten signatures. Given the digital nature, it is more versatile and can protect not only documents, but also other use cases such as signing non-document data or protecting data for archival.</p>
<p>For document agreements, digital signatures signed using digital certificates from Netrust <sup>[1]</sup> enjoy Legal Presumption under the <a href="https://www.netrust.net/blog/understanding-the-legal-framework-of-electronic-signing-in-singapore/" data-wpel-link="internal">Electronic Transactions Act</a>. Simply speaking, documents with valid Netrust signatures will be accepted as evidence in the court of law without unnecessary scrutiny.</p>
<h5>Standards</h5>
<p>The process of creating a digital signature follows standards, the prevalent standard now being PAdES for PDF signatures. For non-PDF files, the CAdES standard can be applied. When engaging with the vendors, it would be best to put compliance with standards as one of the requirements. This also helps prevent vendor lock-in.</p>
<h5>Applications</h5>
<p>As the technology and processes are already mature, digital signatures can be easily created with off the shelf applications. For small amounts or ad hoc signatures, Adobe Reader is readily available. You will however, have to get your own <a href="https://www.netrust.net/digital-signing/nsignbasic/" data-wpel-link="internal">digital certificate</a> that proves your identity. If you have a Singpass account, you can make use of our <a href="https://www.netrust.net/digital-signing/nsignsg/" data-wpel-link="internal">nSignSG</a> service to utilise Sign with Singpass, which already comes with a digital certificate <sup>[2]</sup> with your identity as well.</p>
<p>For larger amounts of signatures or if you desire a systematic way of signing and verification, there are workflow solutions such as <a href="https://www.netrust.net/digital-signing/nsignhub/" data-wpel-link="internal">nSignHub</a> or backend applications like <a href="https://www.netrust.net/digital-signing/nsigncore/" data-wpel-link="internal">nSignCore</a> to fulfil the requirements. For these, it is best to seek a consultation to work out which solution is a better fit for your requirements.</p>
<h5>Signature Verification</h5>
<p>As a user, when you receive a digitally signed PDF file, it is important to verify the signature. To do so, utilise PDF applications such as Adobe Reader. When verified, said applications will display the results prominently. Do be wary of applications that display PDF content without verification. Typically, if no results are displayed, no verification is done. For more details, you may refer to <a href="https://www.netrust.net/blog/securing-pdfs-with-digital-signatures/" data-wpel-link="internal">this article,</a> which includes detailed examples.</p>
<h5>Data Archival</h5>
<p>Finally, the digitally signed PDF file needs to be stored securely until it is called upon or the agreement lapses. Conceptually, this is identical to storing signed document papers, except that the ‘digital ink’ doesn’t fade. Consult your organisation’s data retention policies for guidelines.</p>
<h5>Conclusion</h5>
<p>There is a lot more to know under the hood, but contrary to common belief, you do not need to know everything to work with digital signatures. What we have outlined above covers the basics you will need as a user or when interacting with vendors. If an application is required, it is prudent to involve technical experts to ensure the system and processes are watertight.</p>
<p><strong>To find out more about Digital Signatures or to try some hands-on activities, you can reach out to us to organize a session of <a href="https://www.netrust.net/digital-signing/101-workshop/" data-wpel-link="internal">Digital Signing 101</a> Workshop. No cost, no obligations! Just knowledge sharing.</strong></p>
<p>&nbsp;</p>
<p>We are also including the answers to some frequently asked questions below that we have encountered before. Check them out.</p>
<h6><span style="text-decoration: underline;">FAQs</span></h6>
<ul>
<li>Can I sign just a section of the file?</li>
</ul>
<p>This is not possible for PDF signing; digital signatures are applied to the whole document. You can simulate the intent by having certain signers sign at the end of sections instead of at the end of the document.</p>
<ul>
<li>I need to make changes after the first signature. How can I do it?</li>
</ul>
<p>This requires some preplanning. This scenario is typically only required when the next signer needs to put the current date on the form, as compared to the concept of really ‘editing’ the document, which should be finalised before any party signs the document.</p>
<p>First, you must ensure that the fields are not locked after the first signature. This typically means certain settings need to be done depending on which application is used to create the digital signature. Then, changes can still be made on the fields as required.</p>
<p>During this stage, any changes made are reflected and past signed versions can be previewed through Adobe Reader. Here are some examples of how the process will look.</p>
<p><span style="text-decoration: underline;"><strong>With first signature only: </strong></span></p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-12573" src="https://www.netrust.net/wp-content/uploads/2026/01/with-first-signature-only.png" alt="" width="602" height="224" srcset="https://www.netrust.net/wp-content/uploads/2026/01/with-first-signature-only.png 602w, https://www.netrust.net/wp-content/uploads/2026/01/with-first-signature-only-300x112.png 300w" sizes="auto, (max-width: 602px) 100vw, 602px" /></p>
<p><span style="text-decoration: underline;"><strong>With changes applied:</strong></span></p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-12592 size-large" src="https://www.netrust.net/wp-content/uploads/2026/01/Digital-Signing-with-changes-applied-1024x284.png" alt="" width="1024" height="284" srcset="https://www.netrust.net/wp-content/uploads/2026/01/Digital-Signing-with-changes-applied-1024x284.png 1024w, https://www.netrust.net/wp-content/uploads/2026/01/Digital-Signing-with-changes-applied-300x83.png 300w, https://www.netrust.net/wp-content/uploads/2026/01/Digital-Signing-with-changes-applied-768x213.png 768w, https://www.netrust.net/wp-content/uploads/2026/01/Digital-Signing-with-changes-applied.png 1379w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></p>
<p><span style="text-decoration: underline;"><strong>With second signature applied: </strong></span></p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-12571" src="https://www.netrust.net/wp-content/uploads/2026/01/with-second-signature-applied.png" alt="" width="602" height="268" srcset="https://www.netrust.net/wp-content/uploads/2026/01/with-second-signature-applied.png 602w, https://www.netrust.net/wp-content/uploads/2026/01/with-second-signature-applied-300x134.png 300w" sizes="auto, (max-width: 602px) 100vw, 602px" /></p>
<ul>
<li>How can I protect the changes that I have made?</li>
</ul>
<p>Apply another digital signature on it. Typically, a digital signature should be the last action taken on the file, and it should also lock all fields to prevent further changes afterwards.</p>
<ul>
<li>My company’s processes require the signer to sign on every page as an acknowledgement. Can this be done?</li>
</ul>
<p>Technically, yes. But it is not recommended as every digital signature covers the entire document and comes with its own size overhead. This will bloat up the file size unnecessarily.</p>
<p>It is typically recommended to advise the signer to review the document in its entirety before signing. Alternatively, an electronic signature can be placed on each page to represent the same acknowledgement.</p>
<ul>
<li>I have already signed a file, but then I lost my key/token! What should I do?</li>
</ul>
<p>Well, the good news is the signing process typically embeds your digital certificate (Without the key) into the digital signature, thus ensuring that anyone can verify the signature. So, this does not affect any of the files you have already signed.</p>
<p>However, the bad news is, you will not be able to sign any more files since the key/token is lost. You should also immediately contact the certificate authority to report that this is lost so that they can revoke the certificate to prevent misuse and reissue you a new digital certificate.</p>
<ul>
<li>How do I verify a digital signature?</li>
</ul>
<p>PDF applications like Adobe Reader can be used, it will automatically verify the signature(s) when opening the file. For applications, they can integrate with products which provide an API to verify digital signatures such as <a href="https://www.netrust.net/digital-signing/nsigncore/" data-wpel-link="internal">nSignCore</a>.</p>
<ul>
<li>The digital signature is valid. But how do I know I can trust the person/organisation who signed the file?</li>
</ul>
<p>First, you must be aware of where the document originates from. If the document came from an organisation, the identity in the signature should be from the organisation or a member of the organisation.</p>
<p>The certificate authority is required to verify the applicant’s identity, including whether they are an authorised staff member from the organisation, before issuing the digital certificate which is signed with a digital signature.</p>
<p>If in doubt, contact the person or organisation to clarify.</p>
<ul>
<li>Can someone else see the document content?</li>
</ul>
<p class="zw-line-content"><span class="zw-portion zw-text-portion" data-text-len="95">Yes, digital signatures does not hide the document content. You can explore encryption (Read up more on our article on <a href="https://www.netrust.net/blog/explaining-encryption-through-real-world-examples/" data-wpel-link="internal">Explaining Encryption through real world examples</a>) or utilise password protection measures to fulfil that requirement. </span></p>
<ul>
<li>Can digital signatures and encryption be used together?</li>
</ul>
<p>Certainly, they are not mutually exclusive.</p>
<ul>
<li>Can someone else tamper with the document content?</li>
</ul>
<p>It is not possible to edit the document data without breaking the digital signature.</p>
<ul>
<li>Can someone else reproduce my digital signature after tampering with the document content?</li>
</ul>
<p>It is not possible to do that unless they can access the key that comes with your digital certificate. Hence, it is important keep your key/token securely.</p>
<ul>
<li>Can I know what has been changed, or revert the document back to the original state?</li>
</ul>
<p>Digital signatures are designed to flag out tampering, but it is not possible to highlight or revert the changes. Therefore, it is still important to retain a copy of the digitally signed document so that a pristine copy is available when required.</p>
<p><span class="zw-portion zw-text-portion" data-text-len="77">Reference table on the differences between Digital Signatures and Encryption.</span><span class="EOP-readonly EOP"> </span></p>
<p><img loading="lazy" decoding="async" class="alignnone size-large wp-image-12691" src="https://www.netrust.net/wp-content/uploads/2026/01/Reference-Table-between-Digital-Signatures-and-Encryption-1024x538.png" alt="" width="1024" height="538" srcset="https://www.netrust.net/wp-content/uploads/2026/01/Reference-Table-between-Digital-Signatures-and-Encryption-1024x538.png 1024w, https://www.netrust.net/wp-content/uploads/2026/01/Reference-Table-between-Digital-Signatures-and-Encryption-300x158.png 300w, https://www.netrust.net/wp-content/uploads/2026/01/Reference-Table-between-Digital-Signatures-and-Encryption-768x403.png 768w, https://www.netrust.net/wp-content/uploads/2026/01/Reference-Table-between-Digital-Signatures-and-Encryption.png 1203w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></p>
<pre>[1] Other than Netrust, signatures signed using Sign with Singpass also enjoy legal presumption. Information is accurate at time of publish.

[2] Certificate is issued from Govtech Certificate Authority upon first attempt to sign using Sign with Singpass.</pre>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p class="ai-optimize-26">Follow us on <a href="https://www.linkedin.com/company/netrust-pte-ltd" data-wpel-link="external" rel="external noopener noreferrer"><strong>LinkedIn</strong></a> for the latest happenings/updates.</p>
<p>The post <a href="https://www.netrust.net/blog/explaining-digital-signatures-through-real-world-objects/" data-wpel-link="internal">Explaining Digital Signatures Through Real World Objects</a> appeared first on <a href="https://www.netrust.net" data-wpel-link="internal">Netrust</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
