News from the PKI Consortium Members

An aggregated list of news published by our members

Case Study: Large Canadian Bank Leverages ADM for Temenos Transact for Test Data Management

Discover how ADM simplifies data discovery, subsetting and masking in complex data environments, like core banking. The …

Published on Friday March 21, 2025 at accutivesecurity.com
HID Webinar: Phishing Resistance

Accutive Security and HID dive into how FIDO devices like smartcards and usb keys can protect against advanced phishing …

Published on Friday March 21, 2025 at accutivesecurity.com
The Essential Role of Hardware Security Modules (HSMs) in Public Key Infrastructures (PKI)

Public Key Infrastructure (PKI) is fundamental to secure digital communications, authentication, and encryption across …

Published on Thursday March 20, 2025 at www.encryptionconsulting.com
Decent Cybersecurity on the EU White Paper for Defence and Readiness 2030

The European Commission has unveiled the White Paper for European Defence – Readiness 2030, marking a major step in …

Published on Thursday March 20, 2025 at decentcybersecurity.eu
LMS Signing: Future-Proofing Digital Security in the Quantum Era

Leighton-Micali Signature (LMS) is a digital signature scheme designed to keep our data safe in a world where quantum …

Published on Wednesday March 19, 2025 at www.encryptionconsulting.com
Encryption Consulting Announces Partnership with DigiCert for Public Certificates 

Encryption Consulting, a leading provider of applied cryptography services and solutions, is pleased to announce its …

Published on Wednesday March 19, 2025 at www.encryptionconsulting.com
Blue-NAP-Americas-Success-Story

The post Blue-NAP-Americas-Success-Story appeared first on Chunk Works.

Published on Wednesday March 19, 2025 at chunkworks.net
IEC 62443: How to secure IACS (Industrial Automation and Control Systems)

IEC 62443 is a set of international standards developed by the International Electrotechnical Commission (IEC), which …

Published on Tuesday March 18, 2025 at www.encryptionconsulting.com
AI innovation requires AI security: Hear what’s new at Microsoft Secure

When you’re secure—innovation happens. But, the fast pace of AI often outpaces traditional security measures, leaving …

Published on Tuesday March 18, 2025 at techcommunity.microsoft.com
StilachiRAT analysis: From system reconnaissance to cryptocurrency theft

Microsoft Incident Response uncovered a novel remote access trojan (RAT) named StilachiRAT, which demonstrates …

Published on Monday March 17, 2025 at www.microsoft.com
Data Masking Tools Gartner (Updated 2025): Comparing top-rated data masking tools

Choosing the right data masking tools can be overwhelming with many options available in the market. Gartner Peer …

Published on Monday March 17, 2025 at accutivesecurity.com
Why You Need More Than Microsoft Defender

While M365 Business Premium offers enhanced security, exploring specialized cybersecurity solutions like Coro can …

Published on Monday March 17, 2025 at creaplus.com
Decoding the Secrets: Cryptography vs. Cryptanalysis

Understanding the basics of cryptography will help you combat emerging cryptanalysis threats. Read More …

Published on Monday March 17, 2025 at creaplus.com
RISKANTNE O RIZIKU

(a podobných pojmoch) doc. Ing. Jaroslav Sivák, CSc., MBA 1. Úvod Článok sa zaoberá úvahami nad základnými pojmami …

Published on Sunday March 16, 2025 at decentcybersecurity.eu
RISKY ABOUT RISK

(and similar concepts) doc. Ing. Jaroslav Sivák, CSc., MBA 1. Introduction This article deals with reflections on the …

Published on Sunday March 16, 2025 at decentcybersecurity.eu
Chunk Works Joins PKI Consortium to advance post-quantum security

Chunk Works, a pioneer in decentralized data infrastructure and next-generation data security solutions, has joined the …

Published on Friday March 14, 2025 at chunkworks.net
Decent Cybersecurity Joins the Public Key Infrastructure Consortium (PKIC)

We are proud to announce that Decent Cybersecurity has officially become a member of the Public Key Infrastructure (PKI) …

Published on Thursday March 13, 2025 at decentcybersecurity.eu
NIST Selects HQC as Fifth Algorithm for Post-Quantum Encryption: What It Means For You

Last year, the National Institute of Standards and Technology (NIST) finalized a set of post-quantum encryption …

Published on Thursday March 13, 2025 at www.encryptionconsulting.com
How MSRC coordinates vulnerability research and disclosure while building community

Learn about the Microsoft Security Response Center, which investigates vulnerabilities and releases security updates to …

Published on Thursday March 13, 2025 at www.microsoft.com
Phishing campaign impersonates Booking .com, delivers a suite of credential-stealing malware

Starting in December 2024, leading up to some of the busiest travel days, Microsoft Threat Intelligence identified a …

Published on Thursday March 13, 2025 at www.microsoft.com
B.EST Solutions Participates in High-Level Digital Cooperation Discussions at DCO General Meeting

At the recent Digital Cooperation Organization (DCO) General Meeting in Jordan, B.EST Solutions’s CEO Jana Krimpe …

Published on Thursday March 13, 2025 at bestsolutions.ee
B.EST Solutions Showcases Cutting-Edge Mobile-ID Technology and Accelerates Dialogue in Saudi Arabia at LEAP 2025

B.EST Solutions made a strong impact at LEAP 2025, showcasing its latest advancements in Mobile ID technology and …

Published on Thursday March 13, 2025 at bestsolutions.ee
B.EST Solutions Exhibits Innovative Mobile ID Portfolio at MWC 2025

B.EST Solutions, a leader in digital identity solutions for high-trust transactions, participated in the Mobile World …

Published on Thursday March 13, 2025 at bestsolutions.ee
ADSS Server 8.3.9 release | Ascertia | Blog

Ascertia is delighted to announce the release of ADSS Server 8.3.9.

Published on Thursday March 13, 2025 at blog.ascertia.com
NIST Selects HQC as a New Standard for Post-Quantum Encryption

The National Institute of Standards and Technology (NIST) has announced the selection of HQC (Hamming Quasi-Cyclic) as …

Published on Wednesday March 12, 2025 at decentcybersecurity.eu
Participate in our community discussions and/or join the consortium