<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Blog on PKI Consortium</title><link>/blog/</link><description>Recent content in Blog on PKI Consortium</description><generator>Hugo -- gohugo.io</generator><language>en</language><managingEditor>feedback@pkic.org (PKI Consortium)</managingEditor><webMaster>feedback@pkic.org (PKI Consortium)</webMaster><copyright>PKI Consortium, Inc. All Rights Reserved</copyright><lastBuildDate>Mon, 02 Mar 2026 12:00:00 +0000</lastBuildDate><atom:link href="/feed/blog/index.xml" rel="self" type="application/rss+xml"/><item><title>IBM Becomes a Diamond Sponsor of the PKI Consortium</title><link>/2026/03/02/ibm-becomes-a-diamond-sponsor-of-the-pki-consortium/</link><pubDate>Mon, 02 Mar 2026 12:00:00 +0000</pubDate><author>feedback@pkic.org (PKI Consortium)</author><guid>/2026/03/02/ibm-becomes-a-diamond-sponsor-of-the-pki-consortium/</guid><description>The PKI Consortium is proud to announce that IBM — a valued member since January 2024 — has become a Diamond Sponsor. This milestone reflects IBM&amp;rsquo;s deep commitment to advancing Public Key Infrastructure and accelerating the global transition to Post-Quantum Cryptography. IBM&amp;rsquo;s support helps sustain the Consortium&amp;rsquo;s working groups, research initiatives, global education programs, and the world&amp;rsquo;s largest dedicated Post-Quantum Cryptography Conference.</description></item><item><title>Post-Quantum Cryptography Conference 2025 Concludes with Urgent Call for Global Migration to Quantum-Resistant Encryption Systems</title><link>/2025/11/04/post-quantum-cryptography-conference-2025-concludes-with-urgent-call-for-global-migration-to-quantum-resistant-encryption-systems/</link><pubDate>Tue, 04 Nov 2025 00:00:00 +0000</pubDate><author>feedback@pkic.org (PKI Consortium)</author><guid>/2025/11/04/post-quantum-cryptography-conference-2025-concludes-with-urgent-call-for-global-migration-to-quantum-resistant-encryption-systems/</guid><description>The world’s largest dedicated gathering on post-quantum cryptography, the Post-Quantum Cryptography Conference 2025, concluded in Kuala Lumpur with a resounding global message: the time to act is now to safeguard the world’s digital economy before quantum computers render today’s encryption obsolete.</description></item><item><title>Defining Quantum-Readiness: Introducing the Post-Quantum Cryptography Maturity Model</title><link>/2025/10/27/defining-quantum-readiness-introducing-the-post-quantum-cryptography-maturity-model/</link><pubDate>Mon, 27 Oct 2025 08:00:00 +0000</pubDate><author>feedback@pkic.org (PKI Consortium)</author><guid>/2025/10/27/defining-quantum-readiness-introducing-the-post-quantum-cryptography-maturity-model/</guid><description>As the industry moves toward a post-quantum future, terms like &amp;ldquo;quantum-ready&amp;rdquo; and &amp;ldquo;quantum-safe&amp;rdquo; are everywhere; but what do they actually mean in practice? The PKI Consortium PQC Working Group has developed a draft Post Quantum Cryptography Maturity Model (PQCMM) to provide clarity for organizations and vendors alike. This model defines maturity levels for PQC adoption across all products and solutions that rely on cryptography. We invite feedback to refine this framework before it becomes an industry reference.</description></item><item><title>Global Leaders Converge in Kuala Lumpur to Drive Quantum-Safe Future at World’s Largest Post-Quantum Cryptography Conference</title><link>/2025/10/27/global-leaders-converge-in-kuala-lumpur-to-drive-quantum-safe-future-at-worlds-largest-post-quantum-cryptography-conference/</link><pubDate>Mon, 27 Oct 2025 07:00:00 +0000</pubDate><author>feedback@pkic.org (PKI Consortium)</author><guid>/2025/10/27/global-leaders-converge-in-kuala-lumpur-to-drive-quantum-safe-future-at-worlds-largest-post-quantum-cryptography-conference/</guid><description>The PKI Consortium announced that the Post-Quantum Cryptography (PQC) Conference will take place from 28 to 30 October 2025, at the Connexion Conference &amp;amp; Event Centre in Kuala Lumpur, Malaysia, bringing together over 2,500 delegates from government, industry, and academia. This event marks the world’s largest dedicated global conference on post-quantum cryptography ever held. The three-day program will feature hands-on workshops, high-level plenaries, and technical tracks focused on the standards, implementation strategies, and policy frameworks required to secure digital infrastructure against emerging quantum threats.</description></item><item><title>Call for Abstracts: PQC Conference 2025 - Kuala Lumpur, Malaysia</title><link>/2025/05/07/call-for-abstracts-pqc-conference-2025-kuala-lumpur-malaysia/</link><pubDate>Wed, 07 May 2025 07:00:00 +0000</pubDate><author>feedback@pkic.org (PKI Consortium)</author><guid>/2025/05/07/call-for-abstracts-pqc-conference-2025-kuala-lumpur-malaysia/</guid><description>The PKI Consortium invites researchers, practitioners, and industry leaders to submit abstracts for the PQC Conference 2025 in Kuala Lumpur, Malaysia. This hybrid event (October 28-30, 2025) will focus on the status and practical implementation of post-quantum cryptography across strategic and technical dimensions.</description></item><item><title>Key Takeaways of the PQC Conference in Austin</title><link>/2025/01/30/key-takeaways-of-the-pqc-conference-in-austin/</link><pubDate>Thu, 30 Jan 2025 07:00:00 +0000</pubDate><author>feedback@pkic.org (PKI Consortium)</author><guid>/2025/01/30/key-takeaways-of-the-pqc-conference-in-austin/</guid><description>Over two days of intensive programming, experts delivered compelling presentations and engaged in insightful panel discussions, both in plenary sessions and concurrent breakout tracks. This year, the focus shifted decisively from theoretical exploration to concrete, actionable steps for implementing quantum-safe cryptography. The key takeaway was clear: delay poses the greatest risk, and immediate action is essential to achieve quantum resilience.</description></item><item><title>Third Post-Quantum Cryptography Conference: Join us in Austin, Texas!</title><link>/2024/10/22/third-post-quantum-cryptography-conference-join-us-in-austin-texas/</link><pubDate>Tue, 22 Oct 2024 08:00:00 +0000</pubDate><author>feedback@pkic.org (PKI Consortium)</author><guid>/2024/10/22/third-post-quantum-cryptography-conference-join-us-in-austin-texas/</guid><description>Join us on January 15 and 16, 2025, at the Thompson Conference Center, University of Texas, Austin for the third Post-Quantum Cryptography Conference. Explore the future of cryptography with industry leaders, technical experts, and decision-makers from across the globe.</description></item><item><title>On the Drawbacks of Post-Quantum Cryptography in TLS</title><link>/2024/09/27/on-the-drawbacks-of-post-quantum-cryptography-in-tls/</link><pubDate>Fri, 27 Sep 2024 12:00:00 +0000</pubDate><author>feedback@pkic.org (PKI Consortium)</author><guid>/2024/09/27/on-the-drawbacks-of-post-quantum-cryptography-in-tls/</guid><description>Ongoing efforts to deploy PQ/hybrid KEMs as drop-in replacements for current mechanisms are well-tested and crucial for protecting information and identity in the near future. On the other hand, PQ signatures remain an unsolved problem - at least in terms of being drop-in replacements for ECC/RSA.</description></item><item><title>A list of cryptographic devices that includes support for remote key attestations</title><link>/2024/03/22/a-list-of-cryptographic-devices-that-includes-support-for-remote-key-attestations/</link><pubDate>Fri, 22 Mar 2024 12:00:00 +0000</pubDate><author>feedback@pkic.org (PKI Consortium)</author><guid>/2024/03/22/a-list-of-cryptographic-devices-that-includes-support-for-remote-key-attestations/</guid><description>The PKI Consortium is managing a a list of cryptographic devices that includes support for remote key attestations, without endorsing their implementation or quality.</description></item><item><title>Second Post-Quantum Cryptography Conference: Register now to join us in Amsterdam or Online!</title><link>/2023/08/31/second-post-quantum-cryptography-conference-register-now-to-join-us-in-amsterdam-or-online/</link><pubDate>Thu, 31 Aug 2023 11:00:00 +0000</pubDate><author>feedback@pkic.org (PKI Consortium)</author><guid>/2023/08/31/second-post-quantum-cryptography-conference-register-now-to-join-us-in-amsterdam-or-online/</guid><description>Join us on November 7 and 8, either in-person at the Meervaart in Amsterdam or remotely online. Explore the forefront of Post-Quantum Cryptography with renowned speakers from NIST, ENISA, BSI, and more. Registration is free and open to all, not limited to PKI Consortium members.</description></item><item><title>Introducing first PKI Maturity Model (PKIMM)</title><link>/2023/08/10/introducing-first-pki-maturity-model-pkimm/</link><pubDate>Thu, 10 Aug 2023 10:05:00 +0000</pubDate><author>feedback@pkic.org (PKI Consortium)</author><guid>/2023/08/10/introducing-first-pki-maturity-model-pkimm/</guid><description>The PKI Consortium publishes initial draft of the PKI maturity model with related resources to help the industry build mature and future proof PKI including guidelines on how to evaluate the assessment and provide reporting to relying parties. The PKI maturity model is recognized as a standard for evaluation, planning, and comparison between different PKI implementations. In this blog post we are going to introduce the model.</description></item><item><title>PKI Consortium Unveils the first PKI Maturity Model for feedback</title><link>/2023/08/10/pki-consortium-unveils-the-first-pki-maturity-model-for-feedback/</link><pubDate>Thu, 10 Aug 2023 10:00:00 +0000</pubDate><author>feedback@pkic.org (PKI Consortium)</author><guid>/2023/08/10/pki-consortium-unveils-the-first-pki-maturity-model-for-feedback/</guid><description>The PKI Consortium, a dynamic alliance dedicated to enhancing trust and security within the digital landscape, proudly announces the preview release of its pioneering PKI Maturity Model. A collaborative effort by the PKI Maturity Model Working Group, this model will revolutionize the way organizations can plan, evaluate, and compare Public Key Infrastructure (PKI) implementations.</description></item><item><title>Call for Post-Quantum Cryptography presentations</title><link>/2023/03/07/call-for-post-quantum-cryptography-presentations/</link><pubDate>Tue, 07 Mar 2023 15:00:00 +0000</pubDate><author>feedback@pkic.org (PKI Consortium)</author><guid>/2023/03/07/call-for-post-quantum-cryptography-presentations/</guid><description>&lt;h2 id="call-for-presentations"&gt;Call for Presentations &lt;a class="header-link" href="#call-for-presentations"&gt;&lt;svg xmlns="http://www.w3.org/2000/svg" width="16" height="16" fill="currentColor" class="bi bi-link-45deg" viewBox="0 0 16 16"&gt;
&lt;path d="M4.715 6.542L3.343 7.914a3 3 0 1 0 4.243 4.243l1.828-1.829A3 3 0 0 0 8.586 5.5L8 6.086a1.001 1.001 0 0 0-.154.199 2 2 0 0 1 .861 3.337L6.88 11.45a2 2 0 1 1-2.83-2.83l.793-.792a4.018 4.018 0 0 1-.128-1.287z"/&gt;
&lt;path d="M6.586 4.672A3 3 0 0 0 7.414 9.5l.775-.776a2 2 0 0 1-.896-3.346L9.12 3.55a2 2 0 0 1 2.83 2.83l-.793.792c.112.42.155.855.128 1.287l1.372-1.372a3 3 0 0 0-4.243-4.243L6.586 4.672z"/&gt;
&lt;/svg&gt;&lt;/a&gt;&lt;/h2&gt;&lt;p&gt;We are pleased to announce that we are currently welcoming submissions for presentation proposals at the upcoming PKI Consortium&amp;rsquo;s Post-Quantum Cryptography Conference. The conference will be held on &lt;strong&gt;November 7-8, 2023&lt;/strong&gt;, in the vibrant city of &lt;strong&gt;Amsterdam, the Netherlands&lt;/strong&gt;.&lt;/p&gt;</description></item><item><title>A successful first Post-Quantum Cryptography Conference</title><link>/2023/03/07/a-successful-first-post-quantum-cryptography-conference/</link><pubDate>Tue, 07 Mar 2023 08:00:00 +0000</pubDate><author>feedback@pkic.org (PKI Consortium)</author><guid>/2023/03/07/a-successful-first-post-quantum-cryptography-conference/</guid><description>The PKI Consortium held its first Post-Quantum Cryptography conference on Friday March 3, in Ottawa, Canada. With a hundred attendees onsite and over six hundred attendees watching the live stream, it was a resounding success.</description></item><item><title>Sharing information on Post-Quantum Cryptography Capabilities</title><link>/2023/01/26/sharing-information-on-post-quantum-cryptography-capabilities/</link><pubDate>Thu, 26 Jan 2023 12:00:00 +0000</pubDate><author>feedback@pkic.org (PKI Consortium)</author><guid>/2023/01/26/sharing-information-on-post-quantum-cryptography-capabilities/</guid><description>The PKI Consortium is managing a PQC Capabilities Matrix of software applications, libraries and hardware that includes support for Post-Quantum Cryptography, without endorsing their implementation or quality.</description></item><item><title>You are invited to participate in the PKI Consortium’s first Post-Quantum Cryptography (PQC) conference</title><link>/2022/11/30/you-are-invited-to-participate-in-the-pki-consortiums-first-post-quantum-cryptography-pqc-conference/</link><pubDate>Wed, 30 Nov 2022 14:00:00 +0000</pubDate><author>feedback@pkic.org (PKI Consortium)</author><guid>/2022/11/30/you-are-invited-to-participate-in-the-pki-consortiums-first-post-quantum-cryptography-pqc-conference/</guid><description>Speakers at this conference include some of the world’s top Post-Quantum Cryptography (PQC) experts and come from government science agencies, standards bodies, and private organizations at the forefront of this new challenge to digital security. Topics will cover the status of PQC standardization at NIST, ETSI, and IETF, government preparations, migration strategies, etc.</description></item><item><title>What is the PKI Maturity Model (PKIMM) and how can you contribute?</title><link>/2022/07/11/what-is-the-pki-maturity-model-pkimm-and-how-can-you-contribute/</link><pubDate>Mon, 11 Jul 2022 08:00:00 +0000</pubDate><author>feedback@pkic.org (PKI Consortium)</author><guid>/2022/07/11/what-is-the-pki-maturity-model-pkimm-and-how-can-you-contribute/</guid><description>The PKI Consortium recently established the PKI Maturity Model Working Group to build a PKI maturity model that will be recognized around the globe as a standard for evaluation, planning, and comparison between different PKI implementations. In this blog post we will tell you more about why we are building the model and how you can contribute to it.</description></item><item><title>An open letter to Apple</title><link>/2022/03/21/an-open-letter-to-apple/</link><pubDate>Mon, 21 Mar 2022 15:00:00 +0000</pubDate><author>feedback@pkic.org (PKI Consortium)</author><guid>/2022/03/21/an-open-letter-to-apple/</guid><description>We would like to thank and also invite Apple to work more closely with organizations such as the CA/Browser Forum, ETSI and the PKI Consortium to address its concerns, work towards harmonization of policies and to support standardized automation in its software before making any changes on its own. This is because unilaterally enforced policies, especially those that go beyond your own root program, can have a disproportionate impact on PKI implementations, its relying parties and the entire ecosystem.</description></item><item><title>PKI Consortium &amp; ETSI sign Memorandum of Understanding (MoU)</title><link>/2022/03/03/pki-consortium-etsi-sign-memorandum-of-understanding-mou/</link><pubDate>Thu, 03 Mar 2022 11:00:00 +0000</pubDate><author>feedback@pkic.org (PKI Consortium)</author><guid>/2022/03/03/pki-consortium-etsi-sign-memorandum-of-understanding-mou/</guid><description>On 26 January PKI Consortium and ETSI signed a Memorandum of Understanding (MoU) to structure and strengthen the relationship between both organizations and foster a closer relationship.</description></item><item><title>Creating a global List of Trust Lists</title><link>/2021/11/24/creating-a-global-list-of-trust-lists/</link><pubDate>Wed, 24 Nov 2021 15:00:00 +0000</pubDate><author>feedback@pkic.org (PKI Consortium)</author><guid>/2021/11/24/creating-a-global-list-of-trust-lists/</guid><description>The PKI Consortium is curating a global List of Trust Lists (a curated list of root, intermediate or issuing CA certificates accepted by a public, private, industry, or solution-specific PKI), one that is not limited to a specific purpose, region, or size, and is open to anyone to contribute.</description></item><item><title>Increasing support and awareness for Remote Key Attestation</title><link>/2021/08/03/increasing-support-and-awareness-for-remote-key-attestation/</link><pubDate>Tue, 03 Aug 2021 12:00:00 +0000</pubDate><author>feedback@pkic.org (PKI Consortium)</author><guid>/2021/08/03/increasing-support-and-awareness-for-remote-key-attestation/</guid><description>The PKI Consortium is collecting information (and looking for contributions) on how or if solutions provide a method to prove to a remote party that a private key was generated, managed inside, and not exportable from, a hardware cryptographic module.</description></item><item><title>From CASC to the Public Key Infrastructure Consortium</title><link>/2021/07/12/from-casc-to-the-public-key-infrastructure-consortium/</link><pubDate>Mon, 12 Jul 2021 07:43:06 +0000</pubDate><author>feedback@pkic.org (PKI Consortium)</author><guid>/2021/07/12/from-casc-to-the-public-key-infrastructure-consortium/</guid><description>Over the years, the need for private, industry, or solution-specific PKI has grown significantly, with stricter policies and the revocation of certificates and CAs becoming more common. The impact of changes in centralized PKI have caused delays and disruption of third-party services that may or may not have been considered. Any PKI (public, private, or specific) must operate according to best practices, clear policies and without a single point of failure.</description></item><item><title>One Year Certs</title><link>/2020/07/09/one-year-certs/</link><pubDate>Thu, 09 Jul 2020 18:43:06 +0000</pubDate><author>feedback@pkic.org (PKI Consortium)</author><guid>/2020/07/09/one-year-certs/</guid><description>Starting on September 1st, SSL/TLS certificates cannot be issued for longer than 13 months (397 days). This change was first announced by Apple at the CA/Browser Forum Spring Face-to-Face event in Bratislava back in March.</description></item><item><title>Could Quantum Computing Help Stave Off the Next Great Pandemic?</title><link>/2020/06/11/could-quantum-computing-help-stave-off-the-next-great-pandemic/</link><pubDate>Thu, 11 Jun 2020 20:00:40 +0000</pubDate><author>feedback@pkic.org (PKI Consortium)</author><guid>/2020/06/11/could-quantum-computing-help-stave-off-the-next-great-pandemic/</guid><description>As we settle into month two of isolation in the world’s collective battle against the COVID-19 pandemic, one talking point you’ve undoubtedly heard time and again is that this won’t truly be over until there’s a vaccine. A post about how quantum computing could simplify it and reduce the time it takes exponentially.</description></item><item><title>How to do HTTPS … The Right Way</title><link>/2020/06/02/how-to-do-https-the-right-way/</link><pubDate>Tue, 02 Jun 2020 14:30:09 +0000</pubDate><author>feedback@pkic.org (PKI Consortium)</author><guid>/2020/06/02/how-to-do-https-the-right-way/</guid><description>With secure HTTP — aka HTTPS (the “S” is short for “secure”) — swiftly becoming universal on the Internet, it is important to know how to configure HTTPS for your website the right way. The payoff for properly securing your website has many benefits.</description></item><item><title>Don’t ‘Compromise’ Your Code Amid Malware Mayhem</title><link>/2020/05/12/dont-compromise-your-code-amid-malware-mayhem/</link><pubDate>Tue, 12 May 2020 18:18:10 +0000</pubDate><author>feedback@pkic.org (PKI Consortium)</author><guid>/2020/05/12/dont-compromise-your-code-amid-malware-mayhem/</guid><description>Code Signing Certificates demand a price premium in the underground online marketplace. This is no surprise considering that criminals sometimes use them to dupe their potential victims into installing malware in their machine.</description></item><item><title>Digital Trust Is Elusive – Are Qualified Trust Services A Solution?</title><link>/2020/05/01/digital-trust-is-elusive-are-qualified-trust-services-a-solution/</link><pubDate>Fri, 01 May 2020 17:00:58 +0000</pubDate><author>feedback@pkic.org (PKI Consortium)</author><guid>/2020/05/01/digital-trust-is-elusive-are-qualified-trust-services-a-solution/</guid><description>&lt;p&gt;A popular saying goes: “Trust takes years to build, seconds to break, and forever to repair.”&lt;/p&gt;
&lt;p&gt;While I wouldn’t completely agree, the idea isn’t wrong. In real life trust between two parties is established over some period of time, depending on a variety of factors. Have you ever wondered why you initially trust some people more and others less, even if you’ve never met them before? There are a complicated multitude of factors that influence our thoughts: the person’s appearance, tone of voice, title or rank, etc. Trust is established over time but can be lost within a few moments.&lt;/p&gt;</description></item><item><title>Preparing for Quantum Computing</title><link>/2020/04/21/preparing-for-quantum-computing/</link><pubDate>Tue, 21 Apr 2020 17:09:27 +0000</pubDate><author>feedback@pkic.org (PKI Consortium)</author><guid>/2020/04/21/preparing-for-quantum-computing/</guid><description>Quantum computing is advancing, and while experts are not sure when there will be a quantum computer powerful enough to break the RSA and ECC cryptographic algorithms that are currently in use, many are operating under the assumption that this can happen within a 10-15 year timeframe.</description></item><item><title>5 Ways to Keep Up with Authentication Certificates</title><link>/2020/02/24/5-ways-to-keep-up-with-authentication-certificates/</link><pubDate>Mon, 24 Feb 2020 13:38:54 +0000</pubDate><author>feedback@pkic.org (PKI Consortium)</author><guid>/2020/02/24/5-ways-to-keep-up-with-authentication-certificates/</guid><description>&lt;p&gt;When it comes to protecting an organization’s data and users, CISOs have no shortage of hurdles. Identity attacks have become sophisticated and convincing, thanks to ransomware, phishing and deep fakes. CISOs have long known the importance of strong identification and authentication controls, but with threats constantly changing and intensifying, having these controls in place is just one piece of the puzzle; they must be managed correctly in order to do their job.&lt;/p&gt;</description></item><item><title>The CA Security Council Looks Ahead to 2020 and Beyond</title><link>/2020/01/09/the-ca-security-council-looks-ahead-to-2020-and-beyond/</link><pubDate>Thu, 09 Jan 2020 21:00:24 +0000</pubDate><author>feedback@pkic.org (PKI Consortium)</author><guid>/2020/01/09/the-ca-security-council-looks-ahead-to-2020-and-beyond/</guid><description>&lt;h2 id="a-whirlwind-of-activity-will-cause-dramatic-shifts-across-the-pki-world-in-the-year-ahead"&gt;&lt;strong&gt;A whirlwind of activity will cause dramatic shifts across the PKI world in the year ahead&lt;/strong&gt; &lt;a class="header-link" href="#a-whirlwind-of-activity-will-cause-dramatic-shifts-across-the-pki-world-in-the-year-ahead"&gt;&lt;svg xmlns="http://www.w3.org/2000/svg" width="16" height="16" fill="currentColor" class="bi bi-link-45deg" viewBox="0 0 16 16"&gt;
&lt;path d="M4.715 6.542L3.343 7.914a3 3 0 1 0 4.243 4.243l1.828-1.829A3 3 0 0 0 8.586 5.5L8 6.086a1.001 1.001 0 0 0-.154.199 2 2 0 0 1 .861 3.337L6.88 11.45a2 2 0 1 1-2.83-2.83l.793-.792a4.018 4.018 0 0 1-.128-1.287z"/&gt;
&lt;path d="M6.586 4.672A3 3 0 0 0 7.414 9.5l.775-.776a2 2 0 0 1-.896-3.346L9.12 3.55a2 2 0 0 1 2.83 2.83l-.793.792c.112.42.155.855.128 1.287l1.372-1.372a3 3 0 0 0-4.243-4.243L6.586 4.672z"/&gt;
&lt;/svg&gt;&lt;/a&gt;&lt;/h2&gt;&lt;p&gt;Suffice it to say that 2019 was filled with challenges and contentiousness as Certificate Authorities and Browsers began to watch their shared visions diverge. The debate around Extended Validation continued as CAs pushed for a range of reforms and browsers pushed to strip its visual indicators. And a ballot to shorten maximum certificate validity periods exposed fault-lines at the CAB Forum.&lt;/p&gt;</description></item></channel></rss>