News from the PKI Consortium Members

An aggregated list of news published by our members

Your Guide To Do A PKI Health Check

PKI health check is a thorough review of your current Public Key Infrastructure (PKI) to ensure it is working properly, …

Published on Thursday July 25, 2024 at www.encryptionconsulting.com
Oracle Data Masking: Oracle Enterprise vs. Alternatives

Oracle Database Overview For decades, Oracle has been a leader in the database management system space with a powerful …

Published on Wednesday July 24, 2024 at accutivesecurity.com
The »Hacker Mindset« Myth: Why Cybersecurity Needs a New Hero

The cybersecurity field has long been captivated by the concept of "thinking like a hacker." Read More …

Published on Wednesday July 24, 2024 at creaplus.com
SigningHub supports signature tablets for face-to-face meetings

Not so long ago, working from home was mandatory, travelling across borders was almost unthinkable and meeting someone …

Published on Tuesday July 23, 2024 at blog.ascertia.com
Case study: Why MISA uses Ascertia technology

MISA Vietnam Joint Stock Company is one of the leading providers of information technology solutions. It has 30 years …

Published on Wednesday July 17, 2024 at blog.ascertia.com
Enterprise Cryptographic Services

Does this sound familiar? You are working at a company on a big project and are just about ready to move to production …

Published on Tuesday July 16, 2024 at garantir.io
Digital signature adoption and challenges in Asia | Ascertia | Blog

In a recent #AscertiaOn episode, Larry Lee, a product specialist from Netrust, provided insightful perspectives on the …

Published on Tuesday July 16, 2024 at blog.ascertia.com
API Access Control: Optimizing your API Security

In the digital transformation era, APIs have become the glue that holds modern tech stacks together. APIs are critical …

Published on Monday July 15, 2024 at accutivesecurity.com
Unified Communication Administrator – Alternativ Containerization expert

Unified Communication Administrator alternativ Containerization expert Responsibilities: – Develop and maintain …

Published on Friday July 12, 2024 at datawh.info
Transformational digital signing for businesses | Ascertia | Blog

Over the last decade, the world’s businesses have embraced digital technology, relying less and less on traditional …

Published on Monday July 8, 2024 at blog.ascertia.com
How to Improve Security Using Centralized Multi-Factor Authentication (MFA)?

Data breaches are happening more frequently than ever before, making organizations’ security defenses weaker and …

Published on Thursday July 4, 2024 at www.encryptionconsulting.com
Detailed Guide To Meeting NIST SP 1800-16 Compliance

NIST SP͏ 1800-16 has recently released their new ͏͏guidelines for managing TLS certificates. The core emphasis has been …

Published on Wednesday July 3, 2024 at www.encryptionconsulting.com
How to Automate F5 Certificate Management

Whether you’re running a small business website, a complex enterprise application, or a cloud-based service, your users …

Published on Wednesday July 3, 2024 at www.encryptionconsulting.com
The Hidden Risks of Expired Certificate Revocation Lists (CRL)

Digital certificates play a crucial role in web security and public key infrastructure, ensuring secure internet …

Published on Tuesday July 2, 2024 at www.encryptionconsulting.com
The Implications of Google’s Move Against Entrust and What It Means for You

In a significant move towards strengthening online security, Google Chrome has announced that it will no longer trust …

Published on Friday June 28, 2024 at www.encryptionconsulting.com
Your Guide For The 90 Day Digital Certificate Shift

SSL/TLS certificates are essential for establishing trust and securing internet communications. An SSL/TLS certificate …

Published on Friday June 28, 2024 at www.encryptionconsulting.com
What is Certificate Lifecycle Management

Organizations need a strong foundation for the WPA2-Enterprise network, and to achieve that, deploying digital …

Published on Wednesday June 26, 2024 at www.encryptionconsulting.com
What is Your Onboarding Process Telling Your Customers?

What is Your Onboarding Process Telling Your Customers? HID + Accutive Security’s Guide to Modernized Identity …

Published on Wednesday June 26, 2024 at accutivesecurity.com
Business application integrations: Simplify your workflows

Imagine a workplace where people navigate tasks effortlessly, context and application switching ceases, data transfers …

Published on Tuesday June 25, 2024 at blog.ascertia.com
A Risk Management Guide for Generative AI

Navigating the complexities of generative AI necessitates a holistic risk management strategy that combines technical …

Published on Monday June 17, 2024 at creaplus.com
Hardware Security Modules (HSMs): The Cornerstone of Modern Cybersecurity

Hardware Security Modules (HSMs) have emerged as a critical component in this defense, serving as the ultimate …

Published on Monday June 17, 2024 at creaplus.com
Identity Governance: The Key to Secure and Efficient Access Management  

In the digital environment, being in possession of authentic user credentials is like being granted a VIP pass to an …

Published on Friday June 14, 2024 at www.encryptionconsulting.com
Guide to your Data Protection Evaluation Checklist: Ensuring Robust Security

It is crucial to understand that data protection is not just an issue that arises due to the legal and regulatory …

Published on Friday June 14, 2024 at www.encryptionconsulting.com
eIDAS 1.0 and eIDAS 2.0 differences | Ascertia | Blog

Change is coming. The second iteration of the European Union’s regulation on electronic identification and trust …

Published on Wednesday June 12, 2024 at blog.ascertia.com
AI vs. AI: Shielding Your Family from the Rising Tide of Personalized Phishing Scams

The threat landscape of cybercrime is rapidly evolving, with artificial intelligence (AI) now being weaponized to …

Published on Friday June 7, 2024 at creaplus.com
Participate in our community discussions and/or join the consortium