News from the PKI Consortium Members

An aggregated list of news published by our members

Sifting through the spines: identifying (potential) Cactus ransomware victims

Authored by Willem Zeeman and Yun Zheng Hu This blog is part of a series written by various Dutch cyber security firms …

Published on Thursday April 25, 2024 at blog.fox-it.com
Ascertia successfully participates in Plugtests | Ascertia | Blog

Ascertia, a leading digital trust solutions provider, is happy to share the results of its participation in one of the …

Published on Wednesday April 24, 2024 at blog.ascertia.com
Preparing for NIS-2 – what you should do now

NIS-2 is on its way The national implementation law for this directive is due to come into force on 18 October 2024, …

Published on Wednesday April 24, 2024 at it-tuv.com
BSI warns of cyber threats

In March, the President of the German Federal Office for Information Security (BSI), Claudia Plattner, visited …

Published on Wednesday April 24, 2024 at it-tuv.com
BMI publishes new draft bill on the CRITIS umbrella law

The first draft bill of the Federal Ministry of the Interior (BMI) for the CRITIS umbrella law was sharply criticised by …

Published on Wednesday April 24, 2024 at it-tuv.com
Hackers target critical infrastructure service providers

For some time now, we have been observing a new wave of cyberattacks, which are particularly strong and primarily target …

Published on Wednesday April 24, 2024 at it-tuv.com
Biometrics: A Flash Point in AI Regulation

According to proprietary verification data from Onfido (now a part of Entrust), deepfakes rose 3100%... The post …

Published on Monday April 22, 2024 at entrustblog.wpengine.com
Top 10 Supply Chain Attacks that Shook the World

Did you know that between 2019 and 2022, software supply chain attacks skyrocketed by an astounding 742%? The surge in …

Published on Monday April 22, 2024 at www.encryptionconsulting.com
Soon to be Deprecated – Are you still using RSA 1024 Bit Keys for Windows?

Microsoft has announced that it will depreciate Windows RSA keys shorter than 2048 bits. This step encourages …

Published on Friday April 19, 2024 at www.encryptionconsulting.com
The Continuous Learning Journey in PKI: Insights from The PKI Guy

The post The Continuous Learning Journey in PKI: Insights from The PKI Guy appeared first on PKI Solutions.

Published on Thursday April 18, 2024 at www.pkisolutions.com
PKI Solutions Kicks off 2024

The post PKI Solutions Kicks off 2024 appeared first on PKI Solutions.

Published on Thursday April 18, 2024 at www.pkisolutions.com
Unlocking Success: The Power of Values in Business

The post Unlocking Success: The Power of Values in Business appeared first on PKI Solutions.

Published on Thursday April 18, 2024 at www.pkisolutions.com
Why Adapt to the Evolving Matrix of X.509 Certificates with CA/Browser Forum Standards

Did you know that only 46% of organizations secured all their digital certificates and keys? As the data suggests, …

Published on Thursday April 18, 2024 at www.encryptionconsulting.com
Why It’s Essential to Be a Book Worm

The post Why It’s Essential to Be a Book Worm appeared first on PKI Solutions.

Published on Wednesday April 17, 2024 at www.pkisolutions.com
Why Is Learning About PKI Technology So Hard?

The post Why Is Learning About PKI Technology So Hard? appeared first on PKI Solutions.

Published on Wednesday April 17, 2024 at www.pkisolutions.com
Upgrading the Software and Firmware of a PED-Based Thales Network HSM 

 Hardware Security Modules, or HSMs, can be a complicated, but important, piece of security infrastructure to maintain. …

Published on Wednesday April 17, 2024 at www.encryptionconsulting.com
Google’s 90-Day Certificates: Quick and Effective Transition to 90-Day TLS/SSL Certificates

The validity period of Transport Layer Security (TLS) certificates has long been a topic of interest among cybersecurity …

Published on Tuesday April 16, 2024 at www.encryptionconsulting.com
Digital Transformations in Africa | Ascertia | Blog

"Africa is poised for unprecedented growth through digital transformation.”

Published on Tuesday April 16, 2024 at blog.ascertia.com
Unified Communication Administrator

Unified Communication Administrator Responsibilities: – Develop and maintain comprehensive UC solutions including VoIP, …

Published on Friday April 12, 2024 at datawh.info
Understanding Cloud Signature Consortium 2 | Ascertia | Blog

Digital trust is the foundation of modern-day business. Ensuring the security and reliability of electronic document …

Published on Wednesday April 10, 2024 at blog.ascertia.com
What is a Trust Store and the Issues Associated with It

Secure communication is essential in today’s world, and Trust stores play an important role in ensuring this. A trust …

Published on Tuesday April 9, 2024 at www.encryptionconsulting.com
What is a QTSP and how do you become one? | Ascertia | Blog

In an increasingly digital world, Qualified Trust Service Providers (QTSPs) emerge as crucial figures. They safeguard …

Published on Tuesday April 9, 2024 at blog.ascertia.com
The New Era of Supply Chain Attacks: Python Developers Hacked in Sophisticated Supply Chain Attack

Did you know that, according to Verizon’s 2022 Data Breach Investigation Report, supply chain attacks were responsible …

Published on Monday April 8, 2024 at www.encryptionconsulting.com
What is PKI (Public Key Infrastructure)? How does it work?

Key Sections What is PKI? Why do we use PKI? What are the encryptions used in PKI? What are digital certificates? What …

Published on Monday April 8, 2024 at www.encryptionconsulting.com
What is Public Key Cryptography?

Key Sections Functions of Public-key cryptography Example of public-key cryptography Advantages Disadvantages Conclusion …

Published on Monday April 8, 2024 at www.encryptionconsulting.com
Participate in our community discussions and/or join the consortium