News from the PKI Consortium Members

An aggregated list of news published by our members

Balancing Privacy and Security: Lessons Learned from Telegram’s Controversy

On Sunday August 25th, 2024, Pavel Durov, the 39-year-old Russian-born billionaire and CEO of Telegram was arrested at a …

Published on Friday September 6, 2024 at blog.01com.com
Everything You Need To Know About PKI-as-a-Service (PKIaaS)

PKI-as-a-service involves deploying and managing an organization’s Public Key Infrastructure (PKI) on a cloud-based …

Published on Friday September 6, 2024 at www.encryptionconsulting.com
Managing Certificate Chaos After Google’s Entrust Distrust

When Google decided to stop trusting new TLS certificates from Entrust, it didn’t just create a technical challenge—it …

Published on Thursday September 5, 2024 at accutivesecurity.com
The Challenges Organizations Face with NIS 2 and DORA

NIS 2 and DORA are undoubtedly a positive development in cyber security. However, they also raise a number of questions …

Published on Sunday September 1, 2024 at creaplus.com
The art and science behind Microsoft threat hunting: Part 3

In this blog post, read how Microsoft Incident Response leverages three types of threat intelligence to enhance incident …

Published on Wednesday August 28, 2024 at www.microsoft.com
Data Masking Challenges in Complex Data Environments and How to Tackle them

As a database administrator, you don’t just maintain systems—you protect your organization’s most sensitive data. With …

Published on Wednesday August 28, 2024 at accutivesecurity.com
Peach Sandstorm deploys new custom Tickler malware in long-running intelligence gathering operations

Between April and July 2024, Microsoft observed Iranian state-sponsored threat actor Peach Sandstorm deploying a new …

Published on Wednesday August 28, 2024 at www.microsoft.com
How Microsoft Entra ID supports US government agencies in meeting identity security requirements

United States Government agencies are adopting Microsoft Entra ID to consolidate siloed identity solutions, reduce …

Published on Monday August 26, 2024 at www.microsoft.com
Microsoft AI Tour: Hear the latest product innovations to elevate your security strategy

The Microsoft AI Tour is coming to a city near you. Join a free, one-day tour event to learn how we are making AI …

Published on Thursday August 22, 2024 at www.microsoft.com
Microsoft again ranked number one in modern endpoint security market share

IDC Worldwide Corporate Endpoint Security Market Shares report for 2023 ranks Microsoft number one in market share with …

Published on Wednesday August 21, 2024 at www.microsoft.com
How to Implement GDPR Data Masking Without Sacrificing Data Usability

If you work with customer data, ensuring GDPR compliance by masking all your PII is crucial. But GDPR data masking is …

Published on Tuesday August 20, 2024 at accutivesecurity.com
AI Performance: Measuring Success Beyond the Hype

AI can be a game-changer, but it's crucial to measure its real impact – the "AI performance" – to ensure investments …

Published on Tuesday August 20, 2024 at creaplus.com
Understanding the Importance of HSMs in Achieving PCI DSS Compliance 

Payment Card Industry Data Security Standard, generally called PCI DSS, is a security standard created to reduce …

Published on Friday August 16, 2024 at www.encryptionconsulting.com
To Revoke or Not to Revoke: Balancing Security with Performance and Operational Complexity

The post To Revoke or Not to Revoke: Balancing Security with Performance and Operational Complexity appeared first on …

Published on Friday August 16, 2024 at www.pkisolutions.com
In-Depth Analysis of FIPS 205: Stateless Hash-Based Digital Signature Standard

The Federal Information Processing Standards Publication (FIPS) 205 introduces a groundbreaking approach to digital …

Published on Tuesday August 13, 2024 at www.encryptionconsulting.com
Understanding FIPS 204: The Module-Lattice-Based Digital Signature Standard 

The Federal Information Processing Standards Publication (FIPS) 204 introduces the Module-Lattice-Based Digital …

Published on Tuesday August 13, 2024 at www.encryptionconsulting.com
Iron Mountain's SigningHub case study | Ascertia | Blog

Iron Mountain was founded over 70 years ago, serving as a strategic partner in storage and information management. It's …

Published on Tuesday August 13, 2024 at blog.ascertia.com
Synthetic vs. Realistic Data for Gen AI & LLM?

How are you training your generative AI models? In AI and machine learning (AI-ML), the type of data you choose can make …

Published on Tuesday August 13, 2024 at accutivesecurity.com
In-Depth Overview of FIPS 203: The Module-Lattice-Based Key-Encapsulation Mechanism Standard

The Federal Information Processing Standards (FIPS) 203 publication introduces the Module-Lattice-Based …

Published on Tuesday August 13, 2024 at www.encryptionconsulting.com
Your Guide to The New Federal Quantum Action Plan

As quantum computing continues to advance, the potential threat it poses to traditional cryptography has become a …

Published on Monday August 12, 2024 at www.encryptionconsulting.com
Race Against Time: Preparing for The Inevitable Q-Day

There is no questioning that the development of quantum computers will potentially enhance various aspects of our life. …

Published on Friday August 9, 2024 at blog.01com.com
Chained for attack: OpenVPN vulnerabilities discovered leading to RCE and LPE

Microsoft researchers found multiple vulnerabilities in OpenVPN that could lead to an attack chain allowing remote code …

Published on Thursday August 8, 2024 at www.microsoft.com
Why Do Enterprises Need HSM Support? 

Most, if not all, organizations in today’s world have or require a Hardware Security Module, or HSM, for their …

Published on Thursday August 8, 2024 at www.encryptionconsulting.com
Best Data Masking Tools Gartner (Updated 2024) : Comparing top-rated tools

Choosing the right data masking tools can be overwhelming with many options available in the market. Gartner Peer …

Published on Wednesday August 7, 2024 at accutivesecurity.com
How Microsoft and NIST are collaborating to advance the Zero Trust Implementation

Both Microsoft and the National Institute of Standards and Technology (NIST) National Cyber security Center of …

Published on Tuesday August 6, 2024 at www.microsoft.com
Participate in our community discussions and/or join the consortium