Public Key Infrastructure Consortium (PKI Consortium)
Trusted digital assets and communication for everyone and everything
The PKI Consortium is comprised of leading organizations that are committed to improve, create and collaborate on generic, industry or use-case specific policies, procedures, best practices, standards and tools that advance trust in assets and communication for everyone and everything using Public Key Infrastructure (PKI) as well as the security of the internet in general. By engaging with users, regulators, supervisory bodies and other interested or relying parties the consortium can address actual issues. [learn more…]
Public Key Infrastructure (PKI) defines the foundation for most modern security systems and provides Confidentiality, Integrity, Authenticity and Non-repudiation. It relies on public key cryptography, a universally accepted asymmetric technology that enables entities to securely communicate using an insecure transport or media, reliably link the data to the signatory and protects the integrity of the data while proving guarantees about the existence of the data at the time of signature creation.
Increasing support and awareness for Remote Key Attestation
August 3, 2021 by Paul van Brouwershaven (Entrust), Tomas Gustavsson (PrimeKey), Giuseppe Damiano HSM Key Attestation Secure Enclave Smart-card Token TPM
The PKI Consortium is collecting information (and looking for contributions) on how or if solutions provide a method to prove to a remote party that a private key was generated, managed inside, and not exportable from, a hardware cryptographic module.
From CASC to the Public Key Infrastructure Consortium
July 12, 2021 by Chris Bailey (Entrust), Paul van Brouwershaven (Entrust) CASC PKI PKIC
Over the years, the need for private, industry, or solution-specific PKI has grown significantly, with stricter policies and the revocation of certificates and CAs becoming more common. The impact of changes in centralized PKI have caused delays and disruption of third-party services that may or may not have been considered. Any PKI (public, private, or specific) must operate according to best practices, clear policies and without a single point of failure.
One Year Certs
July 9, 2020 by Patrick Nohe (GlobalSign) Apple CA/Browser Forum DV Google Identity Microsoft PKI Policy Root Program SHA1 SHA2 SSL/TLS
Starting on September 1st, SSL/TLS certificates cannot be issued for longer than 13 months (397 days). This change was first announced by Apple at the CA/Browser Forum Spring Face-to-Face event in Bratislava back in March.
When it’s summer here in Australia many of us spend a lot of time at the beach. Most “Aussies” will tell you a great deal of their childhood was also spent there, and while we love spending time at the beach, we are also taught to know the dangers. One key lesson is being wary [...] The post <div class="categorydiv"><span class="archive-category ap-badge status-PCI DSS">PCI DSS</span></div><div class="postdate">September 20th, 2021</div>“Swim” Safely to Compliance; Your QSA Can Help You Get to Shore appeared first on SecureTrust. Published on Monday September 20, 2021 at www.securetrust.com
Elliptic curve cryptography (ECC) offers an equivalent level and kind of security as RSA (or Diffie-Hellman) with abundant shorter keys. The post Elliptic Curve Cryptography first appeared on Encryption Consulting. Published on Monday September 20, 2021 at www.encryptionconsulting.com
As the name suggests, Man in the Middle Attack is a type of Cyberattack that happens when a cybercriminal sits between two users. An intruder places himself between user and network to steal or distort data/information. The post Everything About Man-in-the-Middle (MITM) Attack first appeared on Encryption Consulting. Published on Saturday September 18, 2021 at www.encryptionconsulting.com
Either out of necessity or convenience, the adoption of digital banking has skyrocketed since early 2020 and much of this... The post Fighting Digital Banking’s Fraud Problem appeared first on Entrust Blog. Published on Friday September 17, 2021 at www.entrust.com
Our field, applied cryptography, is beneficial to society, government, and private enterprises alike. The technologies that we deliver as an industry are omnipresent – from... The post PrimeKey Tech Days: From the Foundations of PKI to Post-Quantum Encryption appeared first on PrimeKey. Published on Friday September 17, 2021 at www.primekey.com
Normal Newell, Sales Director at Ascertia partner Renaissance discusses the impact of eIDAS on the adoption of remote signing over the last year. Published on Wednesday September 15, 2021 at blog.ascertia.com
Network vulnerability scans are required for all entities that process credit card transactions across an internet connection on their physical or e-commerce network. In this blog, we cover the common issues small merchants face when running network vulnerability scans. I only process a small number of transactions for my business. Do I still need to [...] The post <div class="categorydiv"><span class="archive-category ap-badge status-PCI DSS">PCI DSS</span></div><div class="postdate">September 13th, 2021</div>Network Vulnerability Scanning for Small Merchants appeared first on SecureTrust. Published on Monday September 13, 2021 at www.securetrust.com
Active Directory Certificate Services (AD CS) is one of the server roles introduced in Windows Server 2008 that provides users with customizable services for creating and managing Public Key Infrastructure (PKI) certificates, which can be used for encrypting and digitally signing electronic documents, emails, and messages. The post Understanding Active Directory Certificate Services first appeared on Encryption Consulting. Published on Friday September 10, 2021 at www.encryptionconsulting.com
Code signing is used to authenticate the originator and authenticity of a file. The identity is inserted directly into a program via code or with an executable file (.exe) by creating a digital signature through hashing a private key. The corresponding public key can be used to verify that the file is intact, original, and unmodified. Published on Friday September 10, 2021 at sectigo.com
What do we know about the Cybersecurity Maturity Model Certification (CMMC) process? Much like the framework itself, we know the... The post Six things you can do to prepare for CMMC appeared first on Entrust Blog. Published on Wednesday September 8, 2021 at www.entrust.com
One of the things we often come across in risk and compliance assessments is that of unsupported operating systems or applications - more than we ever should be really. It’s a given (or I should probably say an assumption) that we all understand how important patching can be to keep systems up to date [...] The post <div class="categorydiv"><span class="archive-category ap-badge status-PCI DSS">PCI DSS</span></div><div class="postdate">September 7th, 2021</div>Why so many unsupported systems? appeared first on SecureTrust. Published on Tuesday September 7, 2021 at www.securetrust.com
As IT environments transition to hybrid cloud, security architectures must undergo a corresponding transformation. HyTrust (now a fully owned subsidiary... The post Triple A Security for VMware Cloud Foundation with Entrust CloudControl appeared first on Entrust Blog. Published on Tuesday September 7, 2021 at www.entrust.com
In compliance with pending policy changes by CA/B Forum ballot SC45; Sectigo will update the circumstances under which it can employ file-based DCV. Published on Tuesday September 7, 2021 at sectigo.com
By David Hook This morning, I watched another sunrise from my home office window and saw the successful conclusion of another International Cryptographic Module Conference.... The post Keep Calm and Keep Preparing: ICMC 2021 and the Post-Quantum Cryptography Competition appeared first on PrimeKey. Published on Monday September 6, 2021 at www.primekey.com
Cybersecurity threats grow more complex every day, and one of the different types of attacks that are seen are DNS-based cyber-attacks. The post DNS-Based Cyber Attacks first appeared on Encryption Consulting. Published on Friday September 3, 2021 at www.encryptionconsulting.com
When I asked our global colleagues, “What comes to mind when you hear the name Beth Klehr?”, I heard a... The post Entrust CHRO Beth Klehr Recognized as a 2021 Notable HR Leader appeared first on Entrust Blog. Published on Friday September 3, 2021 at www.entrust.com
Public Key Infrastructure (PKI) can be complex. There’s a time and a place for high-touch, high assurance, purpose-built PKI, such... The post Redefining and simplifying PKI … check! appeared first on Entrust Blog. Published on Thursday September 2, 2021 at www.entrust.com