Public Key Infrastructure Consortium (PKI Consortium)
Trusted digital assets and communication for everyone and everything
The PKI Consortium is comprised of leading organizations that are committed to improve, create and collaborate on generic, industry or use-case specific policies, procedures, best practices, standards and tools that advance trust in assets and communication for everyone and everything using Public Key Infrastructure (PKI) as well as the security of the internet in general. By engaging with users, regulators, supervisory bodies and other interested or relying parties the consortium can address actual issues. [learn more…]
Public Key Infrastructure (PKI) defines the foundation for most modern security systems and provides Confidentiality, Integrity, Authenticity and Non-repudiation. It relies on public key cryptography, a universally accepted asymmetric technology that enables entities to securely communicate using an insecure transport or media, reliably link the data to the signatory and protects the integrity of the data while proving guarantees about the existence of the data at the time of signature creation.
What is the PKI Maturity Model (PKIMM) and how can you contribute?
July 11, 2022 by Roman Cinkais (3Key Company) Maturity model PKIC PKIMM
The PKI Consortium recently established the PKI Maturity Model Working Group to build a PKI maturity model that will be recognized around the globe as a standard for evaluation, planning, and comparison between different PKI implementations. In this blog post we will tell you more about why we are building the model and how you can contribute to it.
An open letter to Apple
March 21, 2022 by PKI Consortium Apple PKIC
We would like to thank and also invite Apple to work more closely with organizations such as the CA/Browser Forum, ETSI and the PKI Consortium to address its concerns, work towards harmonization of policies and to support standardized automation in its software before making any changes on its own. This is because unilaterally enforced policies, especially those that go beyond your own root program, can have a disproportionate impact on PKI implementations, its relying parties and the entire ecosystem.
PKI Consortium & ETSI sign Memorandum of Understanding (MoU)
March 3, 2022 by Sándor Szőke (Microsec) ETSI PKIC
On 26 January PKI Consortium and ETSI signed a Memorandum of Understanding (MoU) to structure and strengthen the relationship between both organizations and foster a closer relationship.
The payments landscape is fiercely competitive and financial institutions are racing to transform their customer payment experience in order to... The post From app to branch and beyond: Cardholder acquisition starts with choice appeared first on Entrust Blog. Published on Thursday August 11, 2022 at blog2.entrust.com
Customer onboarding, account opening and electronic signatures: Finding the right balance between security and convenience.
IDC’s latest forecast makes it clear: The worldwide esignature software market is expected to grow from $2.3 billion in 2020... The post Customer onboarding, account opening and electronic signatures: Finding the right balance between security and convenience. appeared first on Entrust Blog. Published on Monday August 8, 2022 at blog2.entrust.com
With the evolution of IoT, 5G networks and new technologies, their number and variability are growing exponentially. Digital certificates provide the necessary trust and security in communication, represent identity in the virtual world, but also require proper care and management. Companies often struggle with service outages related to certificate expirations, high effort related to certificate … The inevitable automation and management of certificates and trust services Read More » The post The inevitable automation and management of certificates and trust services appeared first on 3Key Company. Published on Thursday August 4, 2022 at www.czertainly.com
We have discussed in the article about [The inevitable automation and management of certificates and trust services ] that there is increasing demand and need for the fully agile PKI. In the world where the technology is literally evolving every day, it is very important to react on the changes in time and with appropriate … Modern and future-proof solution for PKI and trust management Read More » The post Modern and future-proof solution for PKI and trust management appeared first on 3Key Company. Published on Wednesday August 3, 2022 at www.czertainly.com
When it comes to government credentials, fraudsters continue to escalate their attacks. There are a variety of ways to add... The post How lasers increase government credential security appeared first on Entrust Blog. Published on Wednesday August 3, 2022 at blog2.entrust.com
There’s no denying that the meaning of “campus” or “workplace” has changed in every way possible. Now, studying or working... The post Campus has changed. Your building security strategy should too. appeared first on Entrust Blog. Published on Tuesday August 2, 2022 at blog2.entrust.com
We spoke to John Cragg, Director of Strategic Partnerships at Utimaco about the role of Hardware Security Modules (HSM) as part of digital signature solutions, what eIDAS 2 looks like and digital trust. Published on Tuesday August 2, 2022 at blog.ascertia.com
We have an amazing network of partners from every region of the world that are vitally important to securing our... The post This Year’s Global Partner Award Winners Are Customer-Wired appeared first on Entrust Blog. Published on Monday August 1, 2022 at blog2.entrust.com
If you are familiar with EJBCA, one of the popular open-source certification authority, you might be aware that it can support various PKI use-cases, for example issuing web certificate, issuing certificate for ICAO ePassport, as well as issuing IoT certificates. However, when it comes to the automation, management of the certificate lifecycle, and reporting capabilities, … EJBCA empowered by CZERTAINLY Read More » The post EJBCA empowered by CZERTAINLY appeared first on 3Key Company. Published on Tuesday July 26, 2022 at www.czertainly.com
Encryption and Decryption are the two most essential steps for successful communication. To transmit sensitive or confidential information, secrecy and privacy should be assured by a system. Before diving into Encryption and Decryption, let’s first learn about Cryptography. The post Encryption and Decryption first appeared on Encryption Consulting. Published on Monday July 11, 2022 at www.encryptionconsulting.com
Upgrading Vormetric Data Security Manager (DSM) can seem relatively straightforward The post A guide to Vormetric Data Security Manager Upgrade and migration to CipherTrust Manager first appeared on Encryption Consulting. Published on Saturday July 2, 2022 at www.encryptionconsulting.com
Considering the continued rise in cyberattacks and increasing regulations for data protection and information security, Zero Trust as a foundational... The post Zero Trust takes center stage at EIC 2022 appeared first on Entrust Blog. Published on Monday June 27, 2022 at blog2.entrust.com
Information can be exchanged on an insecure network, such as the internet, securely and privately using PKI The post Digital Signature vs Digital Certificates first appeared on Encryption Consulting. Published on Wednesday June 22, 2022 at www.encryptionconsulting.com
The proliferation of identity offerings makes it increasingly difficult for organizations to select an appropriate solution for securing their digital... The post Banco del Estado of Chile wins EIC 2022 award for their cloud-based security solutions from Entrust appeared first on Entrust Blog. Published on Thursday June 16, 2022 at blog2.entrust.com
We were recently part of a joint initiative between Airbus, Renaissance and ourselves at Ascertia where we hosted a webinar about digital signing in the aviation industry. Published on Tuesday June 14, 2022 at blog.ascertia.com
A TLS protocol is an encryption protocol that is designed to secure communications over the internet. The post What is a TLS Handshake and How does it work? first appeared on Encryption Consulting. Published on Monday June 13, 2022 at www.encryptionconsulting.com
We have shown recently how to use the ACME implementation in CZERTAINLY with popular clients like cert-manager or certbot and automate certificate management of not only web servers. Many companies and administrators are using the Microsoft Windows servers. And in Windows environment it is natural choice to use IIS (Internet Information Service) as a web server. So let’s take a look how to … Automated certificate management for IIS Read More » The post Automated certificate management for IIS appeared first on 3Key Company. Published on Tuesday June 7, 2022 at www.czertainly.com