News from the PKI Consortium Members

An aggregated list of news published by our members

Europe Steps Up While the U.S. Steps Back: Cybersecurity Leadership in Flux

On June 6, 2025, U.S. President Donald Trump signed an executive order that rolled back several key cybersecurity …

Published on Friday June 13, 2025 at decentcybersecurity.eu
Trailblazer: Slovakia’s Breakthrough in Post-Quantum Security Chips

Slovakia is shaping the future of cybersecurity. Decent Cybersecurity, a tech firm founded in 2019 and operating across …

Published on Friday June 13, 2025 at decentcybersecurity.eu
Alasan Bisnis Wajib Punya Tanda Tangan Elektronik Tersertifikasi

Di era serba digital seperti sekarang, hampir semua proses bisnis bisa dilakukan tanpa bertatap muka langsung. Mulai …

Published on Friday June 13, 2025 at ezsign.id
Your Guide to SOC 2 Compliance

SOC 2 (System and Organization Controls 2) is a widespread auditing standard developed by the American Institute of …

Published on Thursday June 12, 2025 at www.encryptionconsulting.com
Cyber resilience begins before the crisis

Hear directly from Microsoft’s Deputy CISO for Customer Security, Ann Johnson, about the need for proactive planning in …

Published on Thursday June 12, 2025 at www.microsoft.com
Why You Need an AI Risk Assessment Before Scaling AI

Most organizations today are actively experimenting with artificial intelligence – testing out chatbots, deploying …

Published on Thursday June 12, 2025 at www.adaptivesystemsinc.com
Securing the Software Supply Chain with CodeSign Secure 

Introduction When you think of software security, the first things that come to mind are probably firewalls, antivirus, …

Published on Thursday June 12, 2025 at www.encryptionconsulting.com
Panduan & Contoh Sertifikat Elektronik untuk Berbagai Kebutuhan

Di era digital seperti sekarang, banyak hal bisa dilakukan secara online, termasuk dalam hal administrasi resmi. Jika …

Published on Thursday June 12, 2025 at ezsign.id
Fueling Small Business Success: Discover SBA Lending

Community banks play a vital role in fostering the growth and prosperity of local businesses by offering specialized …

Published on Thursday June 12, 2025 at www.university-bank.com
A Quantum Leap in Code Signing: What’s New in CodeSign Secure v3.02 

In the world of software development and supply chain security, the conversation around post-quantum cryptography (PQC) …

Published on Wednesday June 11, 2025 at www.encryptionconsulting.com
Guide to Synthetic Data Generation: Tool for Secure Testing and AI

The rapidly evolving landscape of data privacy regulations, coupled with the increasing demands of AI/ML development and …

Published on Tuesday June 10, 2025 at accutivesecurity.com
Cara Mudah Buat Tanda Tangan Digital Resmi Tanpa Ribet

Di era digital seperti sekarang, siapa yang masih ingin repot cetak dokumen, tandatangan manual, lalu scan ulang? Waktu …

Published on Tuesday June 10, 2025 at ezsign.id
10 Enterprise Must-Haves for a Successful Post-Quantum Cryptography (PQC) Migration

As quantum computers edge close to practical capability, the cryptographic systems underpinning enterprise security are …

Published on Monday June 9, 2025 at www.encryptionconsulting.com
Europe Poised to Lead Global Cybersecurity as Trump Rolls Back US Federal Initiatives

How the transatlantic policy divide creates opportunities for European cybersecurity leadership and post-quantum …

Published on Sunday June 8, 2025 at decentcybersecurity.eu
Decent Cybersecurity Builds Global Bridges at Honorary Consuls Forum

On June 5, 2025, Decent Cybersecurity took part in the Honorary Consuls Forum of the Slovak Republic at the Historic …

Published on Saturday June 7, 2025 at decentcybersecurity.eu
Connect with us at the Gartner Security & Risk Management Summit

Microsoft will spotlight ​​its AI-first, end-to-end security platform at the Gartner Security & Risk Management Summit. …

Published on Thursday June 5, 2025 at techcommunity.microsoft.com
Meet the Deputy CISOs who help shape Microsoft’s approach to cybersecurity: Part 3

Meet the minds behind how Microsoft prioritizes cybersecurity across every team and employee. The post Meet the Deputy …

Published on Thursday June 5, 2025 at www.microsoft.com
Using Code Signing in CI/CD Pipelines

What is Code Signing and why does it matter in Software Supply Chains? Code signing is a way to prove that a piece of …

Published on Wednesday June 4, 2025 at www.encryptionconsulting.com
Understanding Common SSL Misconfigurations and How to Prevent Them

Despite widespread awareness, SSL misconfigurations continue to surface, most often due to manual oversight, outdated …

Published on Wednesday June 4, 2025 at www.encryptionconsulting.com
WISeKey International Holding Ltd Announces Adjournment of 2025 Annual General Meeting

WISeKey International Holding Ltd Announces Adjournment of 2025 Annual General Meeting Zug, Switzerland, June 4, 2025 – …

Published on Wednesday June 4, 2025 at www.wisekey.com
How Microsoft Defender for Endpoint is redefining endpoint security

Learn why many CISOs prefer Microsoft Defender for Endpoint for comprehensive cyberthreat protection across devices and …

Published on Tuesday June 3, 2025 at www.microsoft.com
WISeKey’s WISeSat Confirms Next Satellite Launch Scheduled for Mid-June from California to Advance Quantum-Safe Space Communications

WISeKey’s WISeSat Confirms Next Satellite Launch Scheduled for Mid-June from California to Advance Quantum-Safe Space …

Published on Tuesday June 3, 2025 at www.wisekey.com
Discover how automatic attack disruption protects critical assets while ensuring business continuity

To help security teams protect critical assets while ensuring business continuity, Microsoft Defender developed …

Published on Monday June 2, 2025 at techcommunity.microsoft.com
Participate in our community discussions and/or join the consortium