<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>News by the members of the PKI Consortium</title><link>https://pkic.org/</link><description>Recent news from the members of the PKI Consortium</description><language>en-us</language><managingEditor>feedback@pkic.org (PKI Consortium)</managingEditor><webMaster>feedback@pkic.org (PKI Consortium)</webMaster><copyright>Members of PKI Consortium, Inc. All Rights Reserved</copyright><lastBuildDate>Mon, 20 Apr 2026 09:31:49 +0000</lastBuildDate><item><title>EU Moves to Write Post-Quantum Cryptography Directly into NIS2 Law</title><link>https://decentcybersecurity.eu/post-quantum-cryptography-nis2/?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=post-quantum-cryptography-nis2</link><pubDate>Mon, 20 Apr 2026 09:31:49 +0000</pubDate><author>decentcybersecurity.eu</author><guid>https://decentcybersecurity.eu/post-quantum-cryptography-nis2/?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=post-quantum-cryptography-nis2</guid><description>For years, the quantum threat lived in the margins of EU cybersecurity regulation. That just changed. On 20 January 2026, the European Commission published COM(2026) 13 final, a proposed directive amending NIS2 as part of a broader cybersecurity simplification package. The proposal touches on everything from ransomware reporting to cross-border supervision. But tucked inside the…
The post EU Moves to Write Post-Quantum Cryptography Directly into NIS2 Law appeared first on Decent Cybersecurity.</description></item><item><title>PQC Transition: A Technical Guide to Crypto Asset Management</title><link>https://www.essendi.de/en/pqc-transition-a-technical-guide-to-crypto-asset-management/</link><pubDate>Fri, 17 Apr 2026 08:36:51 +0000</pubDate><author>www.essendi.de</author><guid>https://www.essendi.de/en/pqc-transition-a-technical-guide-to-crypto-asset-management/</guid><description>The post PQC Transition: A Technical Guide to Crypto Asset Management appeared first on essendi it.</description></item><item><title>From Gen AI experiments to enterprise-scale agents: How Capgemini is industrializing AI with Databricks Agent Bricks</title><link>https://www.capgemini.com/insights/expert-perspectives/from-gen-ai-experiments-to-enterprise-scale-agents-how-capgemini-is-industrializing-ai-with-databricks-agent-bricks/</link><pubDate>Thu, 16 Apr 2026 11:21:42 +0000</pubDate><author>www.capgemini.com</author><guid>https://www.capgemini.com/insights/expert-perspectives/from-gen-ai-experiments-to-enterprise-scale-agents-how-capgemini-is-industrializing-ai-with-databricks-agent-bricks/</guid><description>Generative AI pilots are everywhere – but too often, they remain isolated experiments: impressive demonstrations that struggle to scale, govern, and deliver sustained business value. The challenge is no longer demonstrating AI’s potential. It is operationalizing AI across the enterprise – securely, responsibly, and at speed.
The post From Gen AI experiments to enterprise-scale agents: How Capgemini is industrializing AI with Databricks Agent Bricks appeared first on Capgemini.</description></item><item><title>Activating AI-native marketing</title><link>https://www.capgemini.com/insights/expert-perspectives/activating-ai-native-marketing/</link><pubDate>Thu, 16 Apr 2026 09:14:05 +0000</pubDate><author>www.capgemini.com</author><guid>https://www.capgemini.com/insights/expert-perspectives/activating-ai-native-marketing/</guid><description>Activating AI-native marketing
The post Activating AI-native marketing appeared first on Capgemini.</description></item><item><title>How AI is transforming retail customer experience</title><link>https://www.capgemini.com/insights/expert-perspectives/how-ai-is-transforming-retail-customer-experience/</link><pubDate>Thu, 16 Apr 2026 07:57:42 +0000</pubDate><author>www.capgemini.com</author><guid>https://www.capgemini.com/insights/expert-perspectives/how-ai-is-transforming-retail-customer-experience/</guid><description>Discover how AI is transforming retail customer experience and learn 5 actions retailers can take to improve CX and business value.
The post How AI is transforming retail customer experience appeared first on Capgemini.</description></item><item><title>Decent Cybersecurity Ireland Joins U-HARRIER: A €4 Million European Defence Fund Project to Build Europe’s Next Heavy-Lift Military UAV</title><link>https://decentcybersecurity.eu/decent-cybersecurity-u-harrier-edf-2025/?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=decent-cybersecurity-u-harrier-edf-2025</link><pubDate>Wed, 15 Apr 2026 18:49:38 +0000</pubDate><author>decentcybersecurity.eu</author><guid>https://decentcybersecurity.eu/decent-cybersecurity-u-harrier-edf-2025/?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=decent-cybersecurity-u-harrier-edf-2025</guid><description>Decent Cybersecurity Ireland has been selected for U-HARRIER, one of 57 projects funded under the European Defence Fund 2025. The company will deliver post-quantum cryptography and AI-driven cyber resilience for a 300 kg heavy-lift military UAV designed to operate in contested, GNSS-denied environments. Decent Cybersecurity Ireland has been selected as a consortium partner in U-HARRIER,…
The post Decent Cybersecurity Ireland Joins U-HARRIER: A €4 Million European Defence Fund Project to Build Europe’s Next Heavy-Lift Military UAV appeared first on Decent Cybersecurity.</description></item><item><title>PKI Maintenance and Quarterly Cleanup for Microsoft CA</title><link>https://www.encryptionconsulting.com/pki-maintenance-and-quarterly-cleanup-for-microsoft-ca/</link><pubDate>Wed, 15 Apr 2026 13:13:07 +0000</pubDate><author>www.encryptionconsulting.com</author><guid>https://www.encryptionconsulting.com/pki-maintenance-and-quarterly-cleanup-for-microsoft-ca/</guid><description>Introduction A Microsoft Certificate Authority (CA) is one of the most critical components in an enterprise PKI environment. It is responsible for issuing, enrolling, revoking, and renewing digital certificates that support various use cases, including user and device authentication, data encryption, identity management, and secure communications (SS/TLS). CA installation and administration cannot be treated asContinue reading "PKI Maintenance and Quarterly Cleanup for Microsoft CA"</description></item><item><title>Five trends reshaping the telco agenda: Our expert insights from MWC</title><link>https://www.capgemini.com/insights/expert-perspectives/five-trends-reshaping-the-telco-agenda-our-expert-insights-from-mwc/</link><pubDate>Wed, 15 Apr 2026 11:51:00 +0000</pubDate><author>www.capgemini.com</author><guid>https://www.capgemini.com/insights/expert-perspectives/five-trends-reshaping-the-telco-agenda-our-expert-insights-from-mwc/</guid><description>Discover five trends reshaping the telco agenda after MWC 2026—from scaling AI securely to digital sovereignty and mainstream space connectivity.
The post Five trends reshaping the telco agenda: Our expert insights from MWC appeared first on Capgemini.</description></item><item><title>Implementing PKI &amp; Digital Signatures using PQC in ADSS Server</title><link>https://blog.ascertia.com/implementing-pki-digital-signatures-using-pqc-in-adss-server</link><pubDate>Wed, 15 Apr 2026 10:30:00 +0000</pubDate><author>blog.ascertia.com</author><guid>https://blog.ascertia.com/implementing-pki-digital-signatures-using-pqc-in-adss-server</guid><description> Post-Quantum Cryptography (PQC) is often discussed in terms of algorithms. The practical deployment is not about algorithms alone; it is about how those algorithms are encoded into real-world cryptographic structures: X.509 certificates, CRLs, CMS signatures, OCSP responses, and timestamp tokens.</description></item><item><title>TLS Certificates: End of Dual Use Starting in 2026</title><link>https://www.essendi.de/en/tls-certificates-end-of-dual-use-starting-in-2026/</link><pubDate>Wed, 15 Apr 2026 08:05:39 +0000</pubDate><author>www.essendi.de</author><guid>https://www.essendi.de/en/tls-certificates-end-of-dual-use-starting-in-2026/</guid><description>The post TLS Certificates: End of Dual Use Starting in 2026 appeared first on essendi it.</description></item><item><title>AD CS Template Hardening: ESC1–ESC16 Defense Playbook</title><link>https://www.encryptionconsulting.com/ad-cs-template-hardening/</link><pubDate>Tue, 14 Apr 2026 17:58:30 +0000</pubDate><author>www.encryptionconsulting.com</author><guid>https://www.encryptionconsulting.com/ad-cs-template-hardening/</guid><description>Microsoft Active Directory Certificate Services (AD CS) has served as the backbone of enterprise PKI for over two decades. It enables organizations to issue digital certificates for user authentication, computer identity, code signing, encryption, smart card logon, and secure communications—all tightly integrated with Active Directory. But that deep integration is a double-edged sword. Certificate templates—theContinue reading "AD CS Template Hardening: ESC1–ESC16 Defense Playbook"</description></item><item><title>Operations simplification – the foundation of smart networks</title><link>https://www.capgemini.com/insights/expert-perspectives/operations-simplification-the-foundation-of-smart-networks/</link><pubDate>Tue, 14 Apr 2026 09:26:29 +0000</pubDate><author>www.capgemini.com</author><guid>https://www.capgemini.com/insights/expert-perspectives/operations-simplification-the-foundation-of-smart-networks/</guid><description>As telecom networks evolve from software-defined to AI-driven and increasingly autonomous, one challenge consistently stands in the way: operational complexity. The post Operations simplification – the foundation of smart networks appeared first on Capgemini.</description></item><item><title>Why more AI tools won’t maximize marketing impact</title><link>https://www.capgemini.com/insights/expert-perspectives/why-more-ai-tools-wont-maximize-marketing-impact/</link><pubDate>Tue, 14 Apr 2026 06:25:09 +0000</pubDate><author>www.capgemini.com</author><guid>https://www.capgemini.com/insights/expert-perspectives/why-more-ai-tools-wont-maximize-marketing-impact/</guid><description>Why more AI tools won’t maximize marketing impact
The post Why more AI tools won’t maximize marketing impact appeared first on Capgemini.</description></item><item><title>Fix NDES Configuration Failed: ERROR_PATH_NOT_FOUND (0x80070003) on Windows Server 2025</title><link>https://www.encryptionconsulting.com/fix-ndes-configuration-failed-on-windows-server-2025/</link><pubDate>Mon, 13 Apr 2026 20:45:00 +0000</pubDate><author>www.encryptionconsulting.com</author><guid>https://www.encryptionconsulting.com/fix-ndes-configuration-failed-on-windows-server-2025/</guid><description>Getting a CMSCEPSetup::Install failure with error code 0x80070003 during NDES setup is one of the most frustrating Active Directory Certificate Services errors. This guide walks you through exactly why it happens and how to fix it, step by step. What is NDES and Why Does it Fail? Network Device Enrollment Service (NDES) is a role service within Active DirectoryContinue reading "Fix NDES Configuration Failed: ERROR_PATH_NOT_FOUND (0x80070003) on Windows Server 2025"</description></item><item><title>Italtel and Quantum Bridge Technologies: solutions to protect critical communications for the post-quantum era</title><link>https://qubridge.io/italtel-quantum-bridge-technologies-post-quantum-security-partnership/</link><pubDate>Mon, 13 Apr 2026 15:01:33 +0000</pubDate><author>qubridge.io</author><guid>https://qubridge.io/italtel-quantum-bridge-technologies-post-quantum-security-partnership/</guid><description>Italtel and Quantum Bridge Technologies: solutions to protect critical communications for the post-quantum era Rome, April 13, 2026 – Italtel, an Italian system integrator with extensive experience in network infrastructures and cybersecurity, announces a strategic partnership with Quantum Bridge Technologies, a Canadian company specialized in quantum security and communications, with the aim of bringing advanced […]
The post Italtel and Quantum Bridge Technologies: solutions to protect critical communications for the post-quantum era appeared first on Quantum Bridge.</description></item><item><title>People you can TRUST grows: TÜV TRUST IT and ciphron join forces</title><link>https://it-tuv.com/en/news/people-you-can-trust-grows-tuv-trust-it-and-ciphron-join-forces/</link><pubDate>Mon, 13 Apr 2026 10:50:25 +0000</pubDate><author>it-tuv.com</author><guid>https://it-tuv.com/en/news/people-you-can-trust-grows-tuv-trust-it-and-ciphron-join-forces/</guid><description>The IT security world is moving a little closer together: TÜV TRUST IT is combining its activities with ciphron and thus consistently continuing its growth strategy. The result is a significantly expanded network of expertise for IT and information security – with greater impact, additional know-how, and a team of more than 200 security specialists […]
Der Beitrag People you can TRUST grows: TÜV TRUST IT and ciphron join forces erschien zuerst auf TÜV TRUST IT.</description></item><item><title>WISeSat and Swiss Space Command of the Swiss Armed Forces Complete Pilot Phase and Prepare Next-Generation WISeSat 6U Mission Planned for November 2026</title><link>https://www.wisekey.com/press/wisesat-and-swiss-space-command-of-the-swiss-armed-forces-complete-pilot-phase-and-prepare-next-generation-wisesat-6u-mission-planned-for-november-2026/</link><pubDate>Mon, 13 Apr 2026 05:00:00 +0000</pubDate><author>www.wisekey.com</author><guid>https://www.wisekey.com/press/wisesat-and-swiss-space-command-of-the-swiss-armed-forces-complete-pilot-phase-and-prepare-next-generation-wisesat-6u-mission-planned-for-november-2026/</guid><description>WISeSat and Swiss Space Command of the Swiss Armed Forces Complete Pilot Phase and Prepare Next-Generation WISeSat 6U Mission Planned for November 2026 Pilot phase validates key technical and operational foundations for a sovereign, secure Swiss space communication architecture.Next-generation 6U platform intends to form the first building blocks, fully funded, of WISeSat’s Quantum Space Orbital […]</description></item><item><title>Vision-Language-Action – Robots are getting a new brain</title><link>https://www.capgemini.com/insights/expert-perspectives/vision-language-action-robots-are-getting-a-new-brain/</link><pubDate>Mon, 13 Apr 2026 02:35:00 +0000</pubDate><author>www.capgemini.com</author><guid>https://www.capgemini.com/insights/expert-perspectives/vision-language-action-robots-are-getting-a-new-brain/</guid><description>Explore vision language and its role in autonomous robots. Discover how VLA enhances human-machine understanding.
The post Vision-Language-Action – Robots are getting a new brain appeared first on Capgemini.</description></item><item><title>DMEA 2026: Practical Insights into Security, Compliance &amp; ISMS</title><link>https://it-tuv.com/en/news/elementor-17086/</link><pubDate>Thu, 09 Apr 2026 12:08:35 +0000</pubDate><author>it-tuv.com</author><guid>https://it-tuv.com/en/news/elementor-17086/</guid><description> The digital health sector is facing a significant area of tension: on the one hand, innovative applications, connected systems and digital services are driving healthcare forward. On the other hand, the requirements for security, compliance and regulation are continuously increasing — and are becoming a real hurdle for many companies. Between BSI specifications, data protection, […]
Der Beitrag DMEA 2026: Practical Insights into Security, Compliance &amp; ISMS erschien zuerst auf TÜV TRUST IT.</description></item><item><title>Strengthening cyber resilience in Japan: Inside Capgemini’s TsukubaCyber Defense Center (CDC)</title><link>https://www.capgemini.com/insights/expert-perspectives/strengthening-cyber-resilience-in-japan-inside-capgeminis-tsukubacyber-defense-center-cdc/</link><pubDate>Thu, 09 Apr 2026 11:55:18 +0000</pubDate><author>www.capgemini.com</author><guid>https://www.capgemini.com/insights/expert-perspectives/strengthening-cyber-resilience-in-japan-inside-capgeminis-tsukubacyber-defense-center-cdc/</guid><description>Delivering enterprise-grade, localized cyber defense by combining global intelligence with deep Japanese expertise to help organizations stay secure in an always-on world.
The post Strengthening cyber resilience in Japan: Inside Capgemini’s TsukubaCyber Defense Center (CDC) appeared first on Capgemini.</description></item><item><title>How Advanced and Qualified eSignatures are transforming the public sector</title><link>https://blog.ascertia.com/how-advanced-and-qualified-electronic-signatures-are-transforming-the-modern-public-sector</link><pubDate>Thu, 09 Apr 2026 10:30:00 +0000</pubDate><author>blog.ascertia.com</author><guid>https://blog.ascertia.com/how-advanced-and-qualified-electronic-signatures-are-transforming-the-modern-public-sector</guid><description> Governments face mounting pressure to improve efficiency, reduce costs, maintain regulatory compliance, and deliver seamless public services.</description></item><item><title>The problem isn’t AI</title><link>https://www.capgemini.com/insights/expert-perspectives/the-problem-isnt-ai/</link><pubDate>Wed, 08 Apr 2026 07:19:03 +0000</pubDate><author>www.capgemini.com</author><guid>https://www.capgemini.com/insights/expert-perspectives/the-problem-isnt-ai/</guid><description>At Capgemini Intelligent Customer Operations, we focus first on restoring operational certainty across customer operations – and only then deploying AI as the force multiplier it was meant to be.
The post The problem isn’t AI appeared first on Capgemini.</description></item><item><title>Growth at a Discount: Opportunities Abound in the APAC Secondaries Market</title><link>https://www.jefferies.com/insights/boardroom-intelligence/growth-at-a-discount-opportunities-abound-in-the-apac-secondaries-market/</link><pubDate>Tue, 07 Apr 2026 16:16:17 +0000</pubDate><author>www.jefferies.com</author><guid>https://www.jefferies.com/insights/boardroom-intelligence/growth-at-a-discount-opportunities-abound-in-the-apac-secondaries-market/</guid><description>The global secondary market saw record volume in 2025, and growth can increasingly be found in the APAC region.   APAC accounts for less than 10% of the now-$240 billion secondary market. But investor appetite is growing as APAC secondary funds have enough dry powder to fund three years’ worth of deals. The APAC secondary
The post Growth at a Discount: Opportunities Abound in the APAC Secondaries Market appeared first on Jefferies.com.</description></item><item><title>Everything About Secure Copy Protocol</title><link>https://www.encryptionconsulting.com/secure-copy-protocol/</link><pubDate>Tue, 07 Apr 2026 15:48:58 +0000</pubDate><author>www.encryptionconsulting.com</author><guid>https://www.encryptionconsulting.com/secure-copy-protocol/</guid><description>When working in the technology field, you will often find the need to transfer files securely to virtual machines or other servers. Some of the most common methods of doing this are using tools like File Transfer Protocol (FTP), Secure File Transfer Protocol (SFTP), or what we are discussing today, Secure Copy Protocol (SCP). SCP utilizes SecureContinue reading "Everything About Secure Copy Protocol"</description></item><item><title>Microsoft Environments and Certificate Management</title><link>https://www.essendi.de/en/microsoft-umgebungen-und-zertifikatsmanagement/</link><pubDate>Tue, 07 Apr 2026 07:36:58 +0000</pubDate><author>www.essendi.de</author><guid>https://www.essendi.de/en/microsoft-umgebungen-und-zertifikatsmanagement/</guid><description>The post Microsoft Environments and Certificate Management appeared first on essendi it.</description></item></channel></rss>