News from the PKI Consortium Members

An aggregated list of news published by our members

From RMF to CSRMC: The DoW’s Bold Move Toward Continuous Cyber Risk Management

Introduction: Why CSRMC? The Department of War (DoW) — the rebranded Defense Department under the current administration …

Published on Saturday October 4, 2025 at massdata.com
Whipping up a career in cybersecurity: Q&A with Capgemini’s Microsoft MVP in security

Linkedin Curiosity, inclusion, and a dash of humor – that’s the recipe Mona Ghadiri, Vice President and Head of Security …

Published on Friday October 3, 2025 at www.capgemini.com
From Insight to Impact: The Role of Next-Gen CRMs in Rare Disease Treatment

From Insight to Impact: The Role of Next-Gen CRMs in Rare Disease Treatment The post From Insight to Impact: The Role of …

Published on Friday October 3, 2025 at www.capgemini.com
Snowflake Openflow: A game-changer for building AI-native applications

Openflow is a managed data integration framework built on Apache NiFi that enables developers to build event-driven, …

Published on Friday October 3, 2025 at www.capgemini.com
New OpenSSL Vulnerabilities Expose Systems to Key Theft and Remote Code Execution

News October 2, 2025 # Topics OpenSSL Vulnerability Patch Follow Us youtube Learning New OpenSSL Vulnerabilities Expose …

Published on Friday October 3, 2025 at securetron.net
Microsoft named a Leader in the IDC MarketScape for XDR

Microsoft has been named a Leader in IDC’s inaugural category for Worldwide Extended Detection and Response (XDR) …

Published on Thursday October 2, 2025 at www.microsoft.com
Garantir Debuts Market-First Unlimited CLM + PKI to Slash Costs and Align Price-to-Value

Unlimited use certificate lifecycle management and private PKI disrupt an overpriced, restrictive market by offering one …

Published on Thursday October 2, 2025 at garantir.io
Teaming and Autonomy: From tools to teammates in the age of HMU

Explore the complex relationship between human and machine in a world of automation and semi-autonomy. How do we adapt? …

Published on Thursday October 2, 2025 at www.capgemini.com
When AI agents become admins: Rethinking privileged access in the age of AI

From resetting passwords and approving workflows to pulling HR data and orchestrating cloud infrastructure, AI agents …

Published on Wednesday October 1, 2025 at www.cyberark.com
Cybersecurity Awareness Month: Security starts with you

At Microsoft, we believe that cybersecurity is as much about people as it is about technology. Explore some of our …

Published on Wednesday October 1, 2025 at www.microsoft.com
WISeKey’s Subsidiaries, SEALSQ and SEALCOIN AG, Unite to Future-Proof AI Agents with Post-Quantum Security

WISeKey’s Subsidiaries, SEALSQ and SEALCOIN AG, Unite to Future-Proof AI Agents with Post-Quantum Security    Geneva, …

Published on Wednesday October 1, 2025 at www.wisekey.com
Top Reasons to Audit Your Cryptographic Asset Inventory

Introduction A cryptographic inventory is a comprehensive catalog of all cryptographic assets within an organization, …

Published on Wednesday October 1, 2025 at www.encryptionconsulting.com
Blueprint for Trust: How Certificate Templates Standardize Security Policies

With ADCS Certificate Templates, you can automate issuance, renewal, and even certificate expiry notifications—keeping …

Published on Wednesday October 1, 2025 at securetron.net
Your Business Called – It Wants a Reboot from the Future

Agentic AI doesn’t just automate what you already do—it questions why you do it in the first place. The post Your …

Published on Wednesday October 1, 2025 at www.capgemini.com
Cyber Brunch with the Cyber Community: Building Knowledge and Partnerships

On September 25, 2025, Decent Cybersecurity took part in the event Cyber Brunch with the Cyber Community, held in the …

Published on Tuesday September 30, 2025 at decentcybersecurity.eu
Why Post-Quantum Trust Begins Inside the Hardware

The start of the quantum computing era brings various challenges to cybersecurity. Quantum computers promise immense …

Published on Tuesday September 30, 2025 at www.encryptionconsulting.com
Building continuous cyber resilience in the age of AI and quantum risks

In today’s digital economy, cyber resilience is the backbone of trust, innovation, and growth. As digital ecosystems …

Published on Tuesday September 30, 2025 at www.capgemini.com
Empowering defenders in the era of agentic AI with Microsoft Sentinel

Microsoft Sentinel is expanding into an agentic platform with general availability of the Sentinel data lake, and the …

Published on Tuesday September 30, 2025 at www.microsoft.com
The invisible threat: Machine identity sprawl and expired certificates

One unmanaged machine identity—whether a TLS certificate, SSH key, code signing certificate, or API secret—that’s all it …

Published on Monday September 29, 2025 at www.cyberark.com
Increasing velocity with the Accelerated Delivery Center®

Capgemini’s Accelerated Delivery Center (ADC) is specifically designed to enable clients to rapidly scale up the …

Published on Monday September 29, 2025 at www.capgemini.com
Aplikasi Tanda Tangan Online untuk Kontrak Bisnis Tanpa Ribet

Di era bisnis yang serba cepat, kecepatan dan efisiensi menjadi kunci dalam mengelola dokumen dan kontrak. Salah satu …

Published on Monday September 29, 2025 at ezsign.id
Cara Mendapatkan e-Meterai Online Tanpa Ribet, Bisa dari Rumah

Di era digital seperti sekarang, hampir semua urusan administrasi bisa dilakukan secara online, termasuk pembelian dan …

Published on Friday September 26, 2025 at ezsign.id
How Outcome IQ delivers the excitement of Ryder Cup to billions

Combining deep insight and personal intimacy to magnify the power of golf The post How Outcome IQ delivers the …

Published on Thursday September 25, 2025 at www.capgemini.com
Introducing Microsoft Marketplace — Thousands of solutions. Millions of customers. One Marketplace.

To empower customers in becoming Frontier, we’re excited to announce the launch of the reimagined Microsoft Marketplace, …

Published on Thursday September 25, 2025 at blogs.microsoft.com
XCSSET evolves again: Analyzing the latest updates to XCSSET’s inventory

Microsoft Threat Intelligence has uncovered a new variant of the XCSSET malware, which is designed to infect Xcode …

Published on Thursday September 25, 2025 at www.microsoft.com
Participate in our community discussions and/or join the consortium