News from the PKI Consortium Members

An aggregated list of news published by our members

Case study: Why MISA uses Ascertia technology

Vietnamese corporation MISA has 30 years of experience developing platforms, software and IT services. Its solutions …

Published on Wednesday July 10, 2024 at blog.ascertia.com
Unified Communication Administrator – Copy

Unified Communication Administrator Responsibilities: – Develop and maintain comprehensive UC solutions including VoIP, …

Published on Tuesday July 9, 2024 at datawh.info
Transformational digital signing for businesses | Ascertia | Blog

Over the last decade, the world’s businesses have embraced digital technology, relying less and less on traditional …

Published on Monday July 8, 2024 at blog.ascertia.com
How to Improve Security Using Centralized Multi-Factor Authentication (MFA)?

Data breaches are happening more frequently than ever before, making organizations’ security defenses weaker and …

Published on Thursday July 4, 2024 at www.encryptionconsulting.com
Detailed Guide To Meeting NIST SP 1800-16 Compliance

NIST SP͏ 1800-16 has recently released their new ͏͏guidelines for managing TLS certificates. The core emphasis has been …

Published on Wednesday July 3, 2024 at www.encryptionconsulting.com
How to Automate F5 Certificate Management

Whether you’re running a small business website, a complex enterprise application, or a cloud-based service, your users …

Published on Wednesday July 3, 2024 at www.encryptionconsulting.com
The Hidden Risks of Expired Certificate Revocation Lists (CRL)

Digital certificates play a crucial role in web security and public key infrastructure, ensuring secure internet …

Published on Tuesday July 2, 2024 at www.encryptionconsulting.com
The Implications of Google’s Move Against Entrust and What It Means for You

In a significant move towards strengthening online security, Google Chrome has announced that it will no longer trust …

Published on Friday June 28, 2024 at www.encryptionconsulting.com
Your Guide For The 90 Day Digital Certificate Shift

SSL/TLS certificates are essential for establishing trust and securing internet communications. An SSL/TLS certificate …

Published on Friday June 28, 2024 at www.encryptionconsulting.com
What is Certificate Lifecycle Management

Organizations need a strong foundation for the WPA2-Enterprise network, and to achieve that, deploying digital …

Published on Wednesday June 26, 2024 at www.encryptionconsulting.com
What is Your Onboarding Process Telling Your Customers?

What is Your Onboarding Process Telling Your Customers? HID + Accutive Security’s Guide to Modernized Identity …

Published on Wednesday June 26, 2024 at accutivesecurity.com
Business application integrations: Simplify your workflows

Imagine a workplace where people navigate tasks effortlessly, context and application switching ceases, data transfers …

Published on Tuesday June 25, 2024 at blog.ascertia.com
A Risk Management Guide for Generative AI

Navigating the complexities of generative AI necessitates a holistic risk management strategy that combines technical …

Published on Monday June 17, 2024 at creaplus.com
Hardware Security Modules (HSMs): The Cornerstone of Modern Cybersecurity

Hardware Security Modules (HSMs) have emerged as a critical component in this defense, serving as the ultimate …

Published on Monday June 17, 2024 at creaplus.com
Identity Governance: The Key to Secure and Efficient Access Management  

In the digital environment, being in possession of authentic user credentials is like being granted a VIP pass to an …

Published on Friday June 14, 2024 at www.encryptionconsulting.com
Guide to your Data Protection Evaluation Checklist: Ensuring Robust Security

It is crucial to understand that data protection is not just an issue that arises due to the legal and regulatory …

Published on Friday June 14, 2024 at www.encryptionconsulting.com
What is Code Signing? How does Code Signing work?

Code Signing is the process of using digital certificates to sign software, firmware, scripts, and executables to assure …

Published on Wednesday June 12, 2024 at www.encryptionconsulting.com
eIDAS 1.0 and eIDAS 2.0 differences | Ascertia | Blog

Change is coming. The second iteration of the European Union’s regulation on electronic identification and trust …

Published on Wednesday June 12, 2024 at blog.ascertia.com
AI vs. AI: Shielding Your Family from the Rising Tide of Personalized Phishing Scams

The threat landscape of cybercrime is rapidly evolving, with artificial intelligence (AI) now being weaponized to …

Published on Friday June 7, 2024 at creaplus.com
The CJIS Compliance Deadline is Fast Approaching | Is your state / local government ready?

The deadline for CJIS compliance is rapidly approaching – it is mandated that all entities accessing criminal justice …

Published on Tuesday June 4, 2024 at accutivesecurity.com
eIDAS 2.0 comes with new trust services and the Identity Wallet for EU citizens (EUDIW)

The amended EU Regulation has been in force since 21 May 2024 … and now finally brings further trust services and – as …

Published on Monday June 3, 2024 at it-tuv.com
New draft bill on NIS2UmsuCG published, consultation with associations has started

Last week, the German Federal Ministry of the Interior (BMI) published a new draft bill on the NIS-2 Implementation and …

Published on Monday June 3, 2024 at it-tuv.com
The Urgency of Quantum Preparedness

The European Union recognizes the looming threat of quantum computing, a technology with the potential to break current …

Published on Monday June 3, 2024 at creaplus.com
Active Directory Certificate Services (ADCS) Certificate Authority Renewal Error

The post Active Directory Certificate Services (ADCS) Certificate Authority Renewal Error appeared first on PKI …

Published on Friday May 31, 2024 at www.pkisolutions.com
Embracing Disconnection for Enhanced Security

In an era of escalating cyber threats, the ability to physically connect and disconnect from the internet on demand is …

Published on Wednesday May 29, 2024 at creaplus.com
Participate in our community discussions and/or join the consortium