News from the PKI Consortium Members

An aggregated list of news published by our members

Unlocking governmental cost savings with digital signatures

Government agencies worldwide face the growing challenge of modernising their processes. There is an increasing need to …

Published on Tuesday October 22, 2024 at blog.ascertia.com
Are Code Repositories Safe for Your Source Code?

You must have heard about source code repositories at least once in your lifetime. These repos are simply shared storage …

Published on Monday October 21, 2024 at www.encryptionconsulting.com
Data Breach Statistics [2024] : Penalties and Fines for Major regulations

In today’s data-driven world, data breaches are one of the most significant threats facing organizations, with the …

Published on Monday October 21, 2024 at accutivesecurity.com
45-Day Certs? You’ve Got No Time to Lose!

Remember when we were bracing ourselves for 90-day certificates? That shift felt like a game-changer, yet here we are, …

Published on Thursday October 17, 2024 at accutivesecurity.com
New macOS vulnerability, “HM Surf”, could lead to unauthorized data access

Microsoft Threat Intelligence uncovered a macOS vulnerability that could potentially allow an attacker to bypass the …

Published on Thursday October 17, 2024 at www.microsoft.com
PKI Spotlight Integrates PKI Maturity Model Self-Assessment by the PKI Consortium

The post PKI Spotlight Integrates PKI Maturity Model Self-Assessment by the PKI Consortium appeared first on PKI …

Published on Wednesday October 16, 2024 at www.pkisolutions.com
Escalating cyber threats demand stronger global defense and cooperation

We must find a way to stem the tide of this malicious cyber activity. That includes continuing to harden our digital …

Published on Tuesday October 15, 2024 at blogs.microsoft.com
Microsoft’s guidance to help mitigate Kerberoasting  

Kerberoasting, a well-known Active Directory (AD) attack vector, enables threat actors to steal credentials and navigate …

Published on Friday October 11, 2024 at www.microsoft.com
​​Cyber Signals Issue 8 | Education under siege: How cybercriminals target our schools​​

​This edition of Cyber Signals delves into the cybersecurity challenges facing classrooms and campuses, highlighting the …

Published on Thursday October 10, 2024 at www.microsoft.com
Test Data Management & Compliance Challenges For On-Prem Environments

Managing test data in on-prem environments can feel like an uphill battle. As cloud adoption grows, many companies still …

Published on Wednesday October 9, 2024 at accutivesecurity.com
Why Organizations Need PKI-as-a-Service

The 91-minute digital certificate outage caused the Bank of England’s Real Time Gross Settlement System to halt …

Published on Wednesday October 9, 2024 at www.encryptionconsulting.com
File hosting services misused for identity phishing

Since mid-April 2024, Microsoft has observed an increase in defense evasion tactics used in campaigns abusing file …

Published on Tuesday October 8, 2024 at www.microsoft.com
Preventing ServiceNow-style Root Certificate Outages with PKI Posture Management

The post Preventing ServiceNow-style Root Certificate Outages with PKI Posture Management appeared first on PKI …

Published on Monday October 7, 2024 at www.pkisolutions.com
Microsoft Defender for Cloud remediated threats 30% faster than other solutions, according to Forrester TEI study

Forrester found that Microsoft Defender for Cloud markedly enhanced the security, compliance, and operational efficiency …

Published on Monday October 7, 2024 at www.microsoft.com
Announcing the October 2024 PKI Spotlight® Release

The post Announcing the October 2024 PKI Spotlight® Release appeared first on PKI Solutions.

Published on Friday October 4, 2024 at www.pkisolutions.com
Cybersecurity Awareness Month: Securing our world—together

To help our global cyberdefenders, Microsoft has put together the Be Cybersmart Kit, designed to educate everyone, on …

Published on Tuesday October 1, 2024 at www.microsoft.com
Securing digital transactions in pharma│Ascertia│Blog

Attending the Farmaforum event with our partner Camerfirma was a fantastic opportunity to engage with people across the …

Published on Tuesday October 1, 2024 at blog.ascertia.com
Storm-0501: Ransomware attacks expanding to hybrid cloud environments

Microsoft has observed the threat actor tracked as Storm-0501 launching a multi-staged attack where they compromised …

Published on Thursday September 26, 2024 at www.microsoft.com
​​Microsoft is named a Leader in the 2024 Gartner® Magic Quadrant™ for Endpoint Protection Platforms

Gartner® names Microsoft a Leader in Endpoint Protection Platforms—a reflection, we believe, of our continued progress …

Published on Wednesday September 25, 2024 at www.microsoft.com
Choosing the Best Data Anonymization Tools: A Guide for Secure DevOps

When handling sensitive data in today’s regulatory landscape, especially in industries like finance, healthcare, and …

Published on Wednesday September 25, 2024 at accutivesecurity.com
Activate your data responsibly in the era of AI with Microsoft Purview

We are announcing preview for Microsoft Purview Information Protection to restrict content in Microsoft Fabric with …

Published on Wednesday September 25, 2024 at www.microsoft.com
Red Teaming in the age of EDR: Evasion of Endpoint Detection Through Malware Virtualisation

Authors: Boudewijn Meijer && Rick Veldhoven Introduction As defensive security products improve, attackers must refine …

Published on Wednesday September 25, 2024 at blog.fox-it.com
Your Guide To PKI Migration

Public key infrastructure is a solution used to secure and authenticate traffic between web browsers and web servers. It …

Published on Monday September 23, 2024 at www.encryptionconsulting.com
PKI Deployment – 5 Common Mistakes and How to Avoid Them

Public Key Infrastructure (PKI) is the backbone of most organizations’ encryption implementations. PKI provides a …

Published on Friday September 20, 2024 at www.encryptionconsulting.com
How do you efficiently automate certificates? 

Everyone is aware of the rate at which digital identities are expanding; it is not hard to visualize the numbers we …

Published on Thursday September 19, 2024 at www.encryptionconsulting.com
Participate in our community discussions and/or join the consortium