News from the PKI Consortium Members

An aggregated list of news published by our members

API Security: The New Frontline in Enterprise Cyber Defense

APIs have quietly become the lifeblood of modern digital business. They connect applications, enable integrations, and …

Published on Tuesday September 2, 2025 at garantir.io
Beyond the Login: Rethinking Authentication Apps in the Age of Session Hijacking and MFA Fatigue

The Fragile Perimeter of Modern Authentication In the last decade, authentication systems have undergone an impressive …

Published on Tuesday September 2, 2025 at garantir.io
Application Layer Encryption: The Missing Piece in Application Data Security

Have you ever wondered why data breaches keep happening even when companies use encryption? The reality is that not all …

Published on Tuesday September 2, 2025 at garantir.io
Gen Garage: Where tomorrow’s talent builds today’s AI for good

Adopt AI solutions to drive sustainability, inclusivity, and efficiency across industries, from disaster management to …

Published on Tuesday September 2, 2025 at www.capgemini.com
Reimagine SaaS management

Optimize SaaS management and navigate On-Demand tech like Cloud and AI. Control costs, enhance security, and maximize …

Published on Tuesday September 2, 2025 at www.capgemini.com
The Proven Way Continuous Compliance Builds Brand Trust

Trust is no longer a soft quality that can be implied with clever marketing. In today’s hyperconnected world, trust is …

Published on Tuesday September 2, 2025 at massdata.com
Three Lazarus RATs coming for your cheese

Authors: Yun Zheng Hu and Mick Koomen Introduction In the past few years, Fox-IT and NCC Group have conducted multiple …

Published on Monday September 1, 2025 at blog.fox-it.com
Connectivity isn’t enough – Telcos must deliver seamless experiences

What festival crowds can teach us about the future of telecoms and the transformation CSPs must embrace. Welcome to our …

Published on Monday September 1, 2025 at www.capgemini.com
A Cryptographic Inventory Checklist for the Post-Quantum Era

Digital transformation has pushed cryptography into the spotlight as the unseen foundation of business security. Yet, …

Published on Monday September 1, 2025 at www.encryptionconsulting.com
Decoding NIST PQC Standards: What They Are, What’s Final, and What’s Next

Post-quantum cryptography (PQC) is how we secure today’s data against tomorrow’s threat posed by future quantum …

Published on Sunday August 31, 2025 at www.encryptionconsulting.com
Luna HSM: Use Cases, Benefits, and Why Organizations Need Hardware Security Modules

When it comes to safeguarding sensitive data, nothing compares to the security provided by a Hardware Security Module …

Published on Sunday August 31, 2025 at massdata.com
Detailed Guide on Installing and Configuring of the Microsoft CA – Active Directory Certifcate Service

Guide | ADCS | Microsoft CA Applicable: SaaS | Enterprise | Community Edition Installation and Configuration of Active …

Published on Saturday August 30, 2025 at securetron.net
Why Your Cryptographic Inventory is Your Master Key

You can’t protect what you can’t see. While most organizations focus on visible threats like malware and hackers, the …

Published on Saturday August 30, 2025 at www.encryptionconsulting.com
Cara Beli E-Meterai Tanpa Perlu ke Kantor Pos, Cukup Online!

Di era digital seperti sekarang, hampir semua aktivitas bisa dilakukan secara online, termasuk urusan administrasi …

Published on Saturday August 30, 2025 at ezsign.id
ADCS – Microsoft Certification Authority Automation with Securetron PKI Trust Manager

With ADCS and MSCA working together, you can automate certificate issuance, manage renewals smoothly, and never miss a …

Published on Friday August 29, 2025 at securetron.net
CNSA 1.0 vs CNSA 2.0: Understanding the Shift and What It Means for You

The Commercial National Security Algorithm Suite (CNSA) is the U.S. National Security Agency’s official set of …

Published on Friday August 29, 2025 at www.encryptionconsulting.com
Smarter rail safety at the edge

Capgemini and Qualcomm are making railway crossings safer The post Smarter rail safety at the edge appeared first on …

Published on Friday August 29, 2025 at www.capgemini.com
Democratizing threat intelligence – Microsoft Defender Threat Intelligence now free in Sentinel

Organizations now have access to Microsoft’s curated threat intelligence feeds at no additional cost. The post …

Published on Friday August 29, 2025 at www.capgemini.com
Cara Perpanjang Sertifikat Elektronik Digital dengan Mudah dan Cepat

Di era serba digital seperti sekarang, penggunaan sertifikat elektronik bukan lagi hal asing. Baik untuk kebutuhan …

Published on Friday August 29, 2025 at ezsign.id
Building Your CBOM for Stronger Digital Security

A Cryptography Bill of Materials (CBOM) is an essential tool for clearly understanding your digital security, especially …

Published on Thursday August 28, 2025 at www.encryptionconsulting.com
WISeKey’s WISeSat Subsidiary Expand its Ground Segment Network in Switzerland

WISeKey’s WISeSat Subsidiary Expand its Ground Segment Network in Switzerland Lausanne, Switzerland – August 28, 2025 – …

Published on Thursday August 28, 2025 at www.wisekey.com
Why a Cryptography Bill of Materials (CBOM) is essential now more than ever

We live in an increasingly interconnected world where digital security is paramount. Every click, every transaction, and …

Published on Wednesday August 27, 2025 at www.encryptionconsulting.com
Storm-0501’s evolving techniques lead to cloud-based ransomware

Financially motivated threat actor Storm-0501 has continuously evolved their campaigns to achieve sharpened focus on …

Published on Wednesday August 27, 2025 at www.microsoft.com
Microsoft ranked number one in modern endpoint security market share third year in a row

For a third year a row, Microsoft has been named the number one leader for endpoint security market share, as featured …

Published on Wednesday August 27, 2025 at www.microsoft.com
The ultimate guide to growing your business with SigningHub

Digital transformation is now a critical requirement for secure, agile operations. At the centre of this shift is …

Published on Wednesday August 27, 2025 at blog.ascertia.com
Participate in our community discussions and/or join the consortium