Data Masking for the Banking Industry: Key Considerations for Financial Institutions
The financial industry is built on trust, and a crucial component of that trust is the secure handling of sensitive …
Published on Thursday February 20, 2025 at accutivesecurity.comMicrosoft at Legalweek: Help safeguard your AI future with Microsoft Purview
Connect with Microsoft at Legalweek 2025 to learn how to embrace AI while protecting your organization’s data with …
Published on Thursday February 20, 2025 at www.microsoft.comCryptographic Bill of Materials (CBOM): The Key to secure your Software Supply Chain
Supply chain attacks are diverse, impacting both corporate organizations and government entities. With commercial …
Published on Wednesday February 19, 2025 at www.encryptionconsulting.comMicrosoft is named a Leader in the 2025 Gartner® Magic Quadrant™ for cyber-physical systems protection platforms
We are excited to announce that Gartner has named Microsoft a Leader in the 2024 Gartner® Magic Quadrant™ for Cyber …
Published on Wednesday February 19, 2025 at www.microsoft.comPreparing for Microsoft’s Strong Certificate Mapping Enforcement – What You Need to Know
The post Preparing for Microsoft’s Strong Certificate Mapping Enforcement – What You Need to Know appeared first on PKI …
Published on Tuesday February 18, 2025 at www.pkisolutions.comJoin us for the end-to-end Microsoft RSAC 2025 Conference experience
Join Microsoft at RSAC 2025, where we will showcase end-to-end security designed to help organizations accelerate the …
Published on Tuesday February 18, 2025 at www.microsoft.comWhat is Cloud-based PKI?
Most organizations nowadays have realized there is no need to put up in-house physical infrastructure for PKI services. …
Published on Friday February 14, 2025 at www.encryptionconsulting.comThe Rise of Modular Cybersecurity: A Game Changer for Businesses
The modular revolution is more than just a trend—it represents the future of cybersecurity. By embracing this flexible …
Published on Friday February 14, 2025 at creaplus.comStorm-2372 conducts device code phishing campaign
Microsoft Threat Intelligence Center discovered an active and successful device code phishing campaign by a threat actor …
Published on Friday February 14, 2025 at www.microsoft.comSecuring DeepSeek and other AI systems with Microsoft Security
Microsoft Security provides cyberthreat protection, posture management, data security, compliance and governance, and AI …
Published on Thursday February 13, 2025 at www.microsoft.comA Successful Story of How our PKI Implementation service assisted a Healthcare firm to focus on delivering faster and better care
Company Overview Our recent client is a leading healthcare provider in Texas, renowned for delivering a broad range of …
Published on Wednesday February 12, 2025 at www.encryptionconsulting.comThe BadPilot campaign: Seashell Blizzard subgroup conducts multiyear global access operation
Microsoft is publishing for the first time our research into a subgroup within the Russian state actor Seashell Blizzard …
Published on Wednesday February 12, 2025 at www.microsoft.comCertificate handover of the BSI TR audit 03161
Since December 2024, we have been a certified auditor for BSI TR 03161. Cologne, February 2025. We have been officially …
Published on Wednesday February 12, 2025 at it-tuv.comA Success Story of Transitioning to FIPS 140-3 from FIPS 140-2
Company Overview Our client was looking to transition to FIPS 140-3 compliance, an important step for enhancing their …
Published on Tuesday February 11, 2025 at www.encryptionconsulting.comBest Practices for Certificate Authority (CA) Certificates Renewal
In the Public Key Infrastructure (PKI) environment, Certificate Authorities (CAs) are the most important components that …
Published on Tuesday February 11, 2025 at www.encryptionconsulting.com5 reasons Trust Service Providers choose Ascertia
Trust Service Providers (TSPs) play a crucial role in developing the digital trust industry, but they face significant …
Published on Tuesday February 11, 2025 at blog.ascertia.comSign Android Package Kit (APK) files with ApkSigner using PKCS#11 library
You’re probably wondering why we would sign an APK, right? A digital signature is a method for demonstrating the …
Published on Monday February 10, 2025 at www.encryptionconsulting.comBuild a stronger security strategy with proactive and reactive incident response: Cyberattack Series
Find out how a cyberattack by Storm-2077 was halted faster because the Microsoft Incident Response team is both …
Published on Monday February 10, 2025 at www.microsoft.comComparison of PKI Spotlight, Microsoft Defender, and Red Sift
The post Comparison of PKI Spotlight, Microsoft Defender, and Red Sift appeared first on PKI Solutions.
Published on Friday February 7, 2025 at www.pkisolutions.comA Success Story of How Encryption Consulting Implemented PKI with Microsoft Intune and Windows Hello for Business
Company Overview We recently worked with a leading beverage company in the United States. The company has been in the …
Published on Friday February 7, 2025 at www.encryptionconsulting.comCode injection attacks using publicly disclosed ASP.NET machine keys
Microsoft Threat Intelligence observed limited activity by an unattributed threat actor using a publicly available, …
Published on Thursday February 6, 2025 at www.microsoft.comWhat’s New with CertSecure Manager?
These days, cyber threats are growing more sophisticated, and managing digital certificates is becoming increasingly …
Published on Thursday February 6, 2025 at www.encryptionconsulting.comWhy HSMs are a Must-Have in Today's Cybersecurity Landscape
In an era where cyber threats are becoming increasingly sophisticated, safeguarding your business's sensitive data is …
Published on Thursday February 6, 2025 at creaplus.comHow Encryption Consulting helped a US-based healthcare firm with CodeSign Secure
Company Overview This organization is a famous and well-respected institution known for availing the best healthcare …
Published on Wednesday February 5, 2025 at www.encryptionconsulting.comA Success Story of How We Strengthened the Security of a Leading U.S. Bank with Our PCI DSS Compliance Assessment
Company Overview We recently completed a comprehensive PCI DSS compliance assessment for one of our clients, a prominent …
Published on Wednesday February 5, 2025 at www.encryptionconsulting.com