We have extended the original research and can now use information from public keys (HTTPS, TLS, SSH, SSL) to audit cyber security management and compliance with internal standards.
Continue reading Your HTTPS Certificate Shows Where Its Key Comes From