News from the PKI Consortium Members

An aggregated list of news published by our members

Why Zero Trust is Essential Security

With Zero Trust, users can access only the approved applications, systems, or specific resources they need, when they …

Published on Monday May 5, 2025 at creaplus.com
Understanding Elliptic Curve Cryptography (ECC)

Imagine you’re sending a private message to a friend, shopping online, or transferring cryptocurrency. In each case, you …

Published on Friday May 2, 2025 at www.encryptionconsulting.com
Security Training: Your Best Defense

By providing employees with the training and knowledge to recognize phishing and social engineering attacks, businesses …

Published on Friday May 2, 2025 at creaplus.com
Analyzing CVE-2025-31191: A macOS security-scoped bookmarks-based sandbox escape

Microsoft uncovered a vulnerability in macOS that could allow specially crafted codes to escape the App Sandbox and run …

Published on Thursday May 1, 2025 at www.microsoft.com
Pushing passkeys forward: Microsoft’s latest updates for simpler, safer sign-ins

Celebrate World Passkey Day with Microsoft! Join us in embracing passkeys for secure, passwordless sign-ins. Learn more …

Published on Thursday May 1, 2025 at www.microsoft.com
WISeKey Confirms June Launch of Next-Generation WISeSat Satellite with SpaceX Featuring Encrypted Communications and SEALCOIN Integration

WISeKey Confirms June Launch of Next-Generation WISeSat Satellite with SpaceX Featuring Encrypted Communications and …

Published on Thursday May 1, 2025 at www.wisekey.com
Cyprus launches eID system incorporating SigningHub

Cyprus launched its own electronic ID system on January 27th, 2025. Applications for a national electronic identity …

Published on Thursday May 1, 2025 at blog.ascertia.com
14 secure coding tips: Learn from the experts at Microsoft Build

At Microsoft Build 2025, we’re bringing together security engineers, researchers, and developers to share practical tips …

Published on Wednesday April 30, 2025 at techcommunity.microsoft.com
Europe's Blackout: The Need for Physical Network Control

Golden button: To better protect ourselves, we need to think beyond computer security. We need ways to physically …

Published on Wednesday April 30, 2025 at creaplus.com
Microsoft announces the 2025 Security Excellence Awards winners

Congratulations to the winners of the Microsoft Security Excellence Awards that recognize the innovative defenders who …

Published on Tuesday April 29, 2025 at www.microsoft.com
Cybersecurity Overkill: Less Can Be More

Beware: Believing that having sophisticated cybersecurity tools in place is enough leads to a precarious false sense of …

Published on Tuesday April 29, 2025 at creaplus.com
Faster, more personalized service begins at the frontline with Microsoft Intune

Secure, cloud-based endpoint management helps healthcare providers empower frontline staff and improve patient care. The …

Published on Monday April 28, 2025 at www.microsoft.com
Addressing the Challenges of Inefficient Channel Management

Two out of three SMBs are likely or very likely to switch vendors or MSSPs after a negative experience. MSSPs simply …

Published on Monday April 28, 2025 at creaplus.com
RISKY ABOUT RISK 2

(and similar concepts) Doc. Ing. Jaroslav Sivák, CSc., MBA 1. Introduction This article continues the reflections on …

Published on Sunday April 27, 2025 at decentcybersecurity.eu
RISKANTNE O RIZIKU 2

(a podobných pojmoch) Doc. Ing. Jaroslav Sivák, CSc., MBA 1. Úvod Článok je pokračovaním v úvahách o základných pojmoch …

Published on Sunday April 27, 2025 at decentcybersecurity.eu
Decent Cybersecurity Launches RSS Feed for Cybersecurity News Access

At Decent Cybersecurity, staying ahead of the curve is part of our DNA. That is why we are excited to announce the …

Published on Saturday April 26, 2025 at decentcybersecurity.eu
Understanding the CA/Browser Forum Code Signing Requirements  

In June 2023, the CA/Browser Forum rolled out a significant update to their code signing requirements, directly …

Published on Friday April 25, 2025 at www.encryptionconsulting.com
​​Explore practical best practices to secure your data with Microsoft Purview​​

Microsoft presents best practices for securing data and optimizing Microsoft Purview implementation, emphasizing the …

Published on Friday April 25, 2025 at www.microsoft.com
China’s Quantum Code Breakthrough Accelerates the Post-Quantum Challenge

The global race for cryptographic supremacy has just narrowed. In late March 2025, researchers from Shanghai University, …

Published on Thursday April 24, 2025 at decentcybersecurity.eu
New whitepaper outlines the taxonomy of failure modes in AI agents

Read the new whitepaper from the Microsoft AI Red Team to better understand the taxonomy of failure mode in agentic AI. …

Published on Thursday April 24, 2025 at www.microsoft.com
Advancing Healthcare Information Sharing with Computable Consent

The Sequoia Project Publishes Review of Challenges and Mobilizes for Solutions (Vienna, VA – April 24, 2025) – Today, …

Published on Thursday April 24, 2025 at sequoiaproject.org
Understanding Zero Trust Architecture: From Establishing Identity to Least Privilege

Over the last few years, the approach to cybersecurity has undergone a fundamental transformation. The old model of …

Published on Wednesday April 23, 2025 at accutivesecurity.com
United Nations Alliance of Civilizations Meeting in Geneva Concludes with Key Recommendations on AI Governance and Launches HUMAN-AI-T: A Global Initiative to Integrate Humanity into Artificial Intelligence

United Nations Alliance of Civilizations Meeting in Geneva Concludes with Key Recommendations on AI Governance and …

Published on Wednesday April 23, 2025 at www.wisekey.com
Understanding the threat landscape for Kubernetes and containerized assets

The dynamic nature of containers can make it challenging for security teams to detect runtime anomalies or pinpoint the …

Published on Wednesday April 23, 2025 at www.microsoft.com
WISeKey Expands Implementation of Digital Identity Solutions from Seychelles to Africa: Empowering Nations with Secure National ID Systems

WISeKey Expands Implementation of Digital Identity Solutions from Seychelles to Africa: Empowering Nations with Secure …

Published on Wednesday April 23, 2025 at www.wisekey.com
Participate in our community discussions and/or join the consortium