News from the PKI Consortium Members

An aggregated list of news published by our members

Understanding Passkeys and Hardware Tokens: Building phishing-resistant authentication

Phishing attacks evolved far beyond the poorly written email scams they were known for. Cybercriminals now employ …

Published on Thursday January 16, 2025 at accutivesecurity.com
A Success Story of How We Seamlessly Migrated CipherTrust Manager to a New Version

Overview  We worked closely with a telecommunication company and guided them in migrating its CipherTrust Manager from …

Published on Thursday January 16, 2025 at www.encryptionconsulting.com
Everything You Need to Know About SSH

In today’s interconnected world, where cyberattacks are constantly increasing, securing remote access to our digital …

Published on Wednesday January 15, 2025 at www.encryptionconsulting.com
A TSPs Guide to Remote Signing in SigningHub | Ascertia | Blog

The growing focus on global eCommerce, regulatory compliance and client expectations is creating significant …

Published on Wednesday January 15, 2025 at blog.ascertia.com
Analyzing CVE-2024-44243, a macOS System Integrity Protection bypass through kernel extensions

Microsoft discovered a macOS vulnerability allowing attackers to bypass System Integrity Protection (SIP) by loading …

Published on Monday January 13, 2025 at www.microsoft.com
3 takeaways from red teaming 100 generative AI products

Since 2018, Microsoft's AI Red Team has probed generative AI products for critical safety and security vulnerabilities. …

Published on Monday January 13, 2025 at www.microsoft.com
Navigating the AI Revolution: Top Security Trends for CISOs

The cybersecurity landscape is constantly evolving, and 2025 promises to be a year of unprecedented challenges and …

Published on Monday January 13, 2025 at creaplus.com
Announcing the January 2025 PKI Spotlight® Release

The post Announcing the January 2025 PKI Spotlight® Release appeared first on PKI Solutions.

Published on Friday January 10, 2025 at www.pkisolutions.com
Signing Apple Applications with Codesign Secure and our Apple CSP

Introduction  The applications you find yourself using on your Macintosh (Mac) are .app applications. Applications used …

Published on Friday January 10, 2025 at www.encryptionconsulting.com
Why security teams rely on Microsoft Defender Experts for XDR for managed detection and response

Microsoft Defender Experts for XDR is a mature and proven service that triages, investigates, and responds to incidents …

Published on Monday January 6, 2025 at www.microsoft.com
To Test or Not to Test? That's NOT the Question!

In the face of relentless cyber threats, security testing is not a question of "if" but "how well." By implementing a …

Published on Friday January 3, 2025 at creaplus.com
A success story of transforming security operations with upgrading CipherTrust Manager

Company Overview  The success story of transforming security operations with upgrading CipherTrust Manager revolves …

Published on Thursday January 2, 2025 at www.encryptionconsulting.com
Navigating the EU's Cyber Resilience Act: Strengthening Device Security

The Cyber Resilience Act represents a significant shift in the EU’s approach to digital security. It is not just a …

Published on Thursday January 2, 2025 at creaplus.com
The Autonomous Pentesting Revolution: AI is Reshaping Security

Autonomous pentesting is no longer a luxury—it's a necessity. Organizations that embrace this technology will gain a …

Published on Monday December 30, 2024 at creaplus.com
Pioneering Post-Quantum Security: Three Decades of Technology Innovation

Since founding 01 Communique in 1992, we’ve maintained an unwavering commitment to technological innovation. Today, …

Published on Monday December 30, 2024 at blog.01com.com
01 Communique Positions Itself at the Forefront of Blockchain Security

At 01 Communique, we’ve always believed in staying ahead of technological threats. Today, as quantum computing advances …

Published on Monday December 30, 2024 at blog.01com.com
A Gift and a Curse: The Sacrifices Required to Secure Our Future in the Quantum Age

The extraordinary computational power of quantum computers makes them a double-edged sword. While they have the ability …

Published on Sunday December 29, 2024 at blog.01com.com
Awareness to Action: Proactively Maintaining Resilience in a Quantum World

After 8 years of intense efforts, in response to the increasingly apparent dangers of post-quantum cybersecurity threat, …

Published on Sunday December 29, 2024 at blog.01com.com
Enhancing Data Security in Telecommunication with CipherTrust Manager Rollout

Company Overview With data security’s utmost importance in today’s date, we worked closely with a telecommunication firm …

Published on Friday December 27, 2024 at www.encryptionconsulting.com
Risks of TLS Certificate Sharing

Digital security isn’t just about the big moves – sometimes, it’s the small decisions that can cause the most trouble. …

Published on Tuesday December 24, 2024 at www.encryptionconsulting.com
How to manage Digital Certificates in a Multi-Cloud environment

In today’s multi-cloud environment, digital certificates are the foundation of secure communication, data protection and …

Published on Tuesday December 24, 2024 at www.encryptionconsulting.com
Future-Proofing Your PKI: Why Crypto-Agility in HSM Matters

For decades, public-key cryptography algorithms like RSA and ECC have formed the bedrock of digital security. However, …

Published on Monday December 23, 2024 at creaplus.com
A guide on how to import certificates to the IIS Server Manager

SSL/TLS certificates are essential for hosting websites on IIS (Internet Information Services) servers as they ensure …

Published on Monday December 23, 2024 at www.encryptionconsulting.com
CISO Challenges for 2025: Overcoming Cybersecurity Complexities

As organizations recognize the immense value and criticality of your data and systems, cybersecurity has become …

Published on Thursday December 19, 2024 at accutivesecurity.com
New Microsoft guidance for the CISA Zero Trust Maturity Model

New Microsoft guidance is now available for United States government agencies and their industry partners to help …

Published on Thursday December 19, 2024 at www.microsoft.com
Participate in our community discussions and/or join the consortium