Every software ever deployed is only as trustworthy as the process that produced it. Code signing sits at the heart of that trust — it proves that a binary …
Sponsor Highlights
Senior Container Administrator (w/m/d) Data-Warehouse GmbH is an expanding software manufacturer and service provider. Over the last 20 years the company has …
Latest Member News
Every software ever deployed is only as trustworthy as the process that produced it. Code signing sits at the heart of that trust — it proves that a binary …
SISP (Sociedade Interbancária e Sistemas de Pagamentos, SA) is a Trust Service Provider in Cabo Verde (Cape Verde). Established in 2000, it is the country’s …
When humanity speaks across the vacuum of space, whether between a flight director on the ground and an astronaut on an orbital station, or between two ground …
Modern Service Integration and Management (SIAM) must evolve from operational governance to ongoing strategic enablement. Performance monitoring is now the …
Explore public administration trends 2026 that focus on digital identity wallets and cybersecurity for resilient governance. The post Trends in 2026 for Public …
The practical deployment of Post-Quantum Cryptography is often related to algorithms, but the real conversation also needs to include how the algorithms are …
The post Automating Certificate Distribution with essendi xc appeared first on essendi it.
Introduction Certificate lifecycle automation is the practice of replacing manual, human-dependent certificate tracking with policy-driven, event-triggered …
Capgemini has been named Red Hat Ecosystem Innovation Partner of the Year, recognizing its OpenShift-based blueprint that enables banks to modernize securely, …
The IPO market has reopened to the industry, and private equity is playing an increasingly important role. Meanwhile, the defense sector, as reflected by the …
Every time you log onto your email or any of your laptops, you’ve likely been required to set up either Multi-Factor Authentication or two-factor …
Homeowners insurance premiums continue to climb across the country, and one of the biggest drivers behind these increases is the surge in homeowners' claims — …
Explore the concept of proactive AI and how it anticipates actions rather than waiting for prompts to act intelligently. The post Unprompted: When AI becomes …
Capgemini turns SAP custom AI into real business value—embedding intelligence into core processes to boost resilience, accelerate decisions, and deliver …
Explore how SAP digital sovereignty enables innovation, resilience, and trust while helping organizations balance control, risk, and business agility. The post …
Learn how to scale AI from proof of concept to enterprise-grade impact by focusing on ROI, data readiness, and value-driven use cases in SAP environments. The …
Every time you visit a website and see that padlock in the browser bar, an SSL/TLS certificate is quietly doing its job, authenticating the server and …
What analysts came to call the "SaaSpocalypse," a months-long compression of software valuations driven by existential fears about artificial intelligence, …
As complexity rises, enterprises rethink control through orchestration—aligning outcomes, AI, platforms, and governance to deliver agility, resilience, and …
KYC breaks in execution—not rules. See how a ServiceNow-native model unifies onboarding, screening, risk, documents, perpetual KYC and investigations into one …
Discover how Genesys + ServiceNow, enabled by Capgemini, turn contact centers into AI-driven orchestration hubs—automating resolution end-to-end. The post …
On 17 April 2026, at the offices of Securemetric Technology (Malaysia), Verichains officially announced a strategic partnership agreement with SecureMetric — …
Shadow AI is the new shadow IT — and most organizations have no formal governance in place. Here’s what an AI policy needs to cover, why the stakes are higher …
The post Changes to D-Trust S/MIME Certificates appeared first on essendi it.
Scott Beicke, Americas Head of Power, Utilities & Infrastructure, and Georges Arbache, Managing Director, Power, Utilities & Infrastructure, shared their …
As oil and gas M&A activity has surged over the past two years, a relatively new financing structure has quietly moved from the margins of the market to the …
Cryptography has quietly become the largest ungoverned attack surface in the enterprise. It is embedded in source code, libraries, network protocols, …
In March 2020, a routine certificate expiry took down a chunk of the internet. The outage tied to Cloudflare wasn’t caused by an advanced attack or some …
SSH keys are a foundational part of secure remote access, yet many teams still use them without fully understanding the trade-offs between the available …
In an era increasingly dominated by digital transformation, the question often arises: is the cloud always the answer? While cloud adoption has soared over the …
Every time you download a software update, install a browser extension, or run an enterprise application, you’re placing a profound level of trust in that …
The post Partnership for End-to-End Certificate Lifecycle Management appeared first on essendi it.
Author: Peter Pekarčík PhD. · Post-Quantum Cryptographer at Decent Cybersecurity 1. Introduction The advent of quantum computing represents a fundamental threat …
Many people focus on financial numbers. Interest rates. Investment returns. Mortgage rates. These things matter and are part of building a strong financial …
If you have ever managed a Windows environment and wondered where your Certificate Authority configuration actually lives inside Active Directory, you are not …
The closure of the Strait of Hormuz has sent shockwaves through global energy markets. With 20% of the world’s ready oil on the water at any given moment, and …
If you manage a Windows Server Public Key Infrastructure (PKI) environment, certificate enrollment is one of the most operationally critical and most frequently …
Editor’s note: A version of this article was first published in Slovak by the author in Pravda on 10 April 2026. The text below is an English adaptation …
For years, the quantum threat lived in the margins of EU cybersecurity regulation. That just changed. On 20 January 2026, the European Commission published …
The post PQC Transition: A Technical Guide to Crypto Asset Management appeared first on essendi it.
Decent Cybersecurity Ireland has been selected for U-HARRIER, one of 57 projects funded under the European Defence Fund 2025. The company will deliver …
Post-Quantum Cryptography (PQC) is often discussed in terms of algorithms. The practical deployment is not about algorithms alone; it is about how those …
The post TLS Certificates: End of Dual Use Starting in 2026 appeared first on essendi it.
Italtel and Quantum Bridge Technologies: solutions to protect critical communications for the post-quantum era Rome, April 13, 2026 – Italtel, an Italian system …
The IT security world is moving a little closer together: TÜV TRUST IT is combining its activities with ciphron and thus consistently continuing its growth …
The digital health sector is facing a significant area of tension: on the one hand, innovative applications, connected systems and digital services are driving …
Governments face mounting pressure to improve efficiency, reduce costs, maintain regulatory compliance, and deliver seamless public services.
The global secondary market saw record volume in 2025, and growth can increasingly be found in the APAC region. APAC accounts for less than 10% of the …