News from the PKI Consortium Members

An aggregated list of news published by our members

01 Communique Partners up with Real Matter to Advance Quantum-Safe Blockchain

In a strategic move 01 Communique has partnered with Hong Kong-based Real Matter Technology Company to bring …

Published on Thursday January 23, 2025 at blog.01com.com
Listen to KELA discuss how to prevent phishing attacks before they get you

By understanding phishing tactics and embracing advanced threat monitoring, organizations can disrupt the cycle of …

Published on Thursday January 23, 2025 at creaplus.com
An Introduction to Cipher Suites

As consultants in the field of applied cryptography, we often encounter the question of whether enabling encryption is …

Published on Wednesday January 22, 2025 at www.encryptionconsulting.com
The Ultimate Guide to prevent SSH Key Sprawl

You must have come across a situation where you had to download or send some personal information through the web. …

Published on Monday January 20, 2025 at www.encryptionconsulting.com
Use Cases and Best Practices with Hardware Security Module (HSM)

Hardware Security Modules (HSMs) emerge as critical components of a robust security infrastructure, acting as …

Published on Friday January 17, 2025 at creaplus.com
Understanding Passkeys and Hardware Tokens: Building phishing-resistant authentication

Phishing attacks evolved far beyond the poorly written email scams they were known for. Cybercriminals now employ …

Published on Thursday January 16, 2025 at accutivesecurity.com
New Star Blizzard spear-phishing campaign targets WhatsApp accounts

In mid-November 2024, Microsoft Threat Intelligence observed the Russian threat actor we track as Star Blizzard sending …

Published on Thursday January 16, 2025 at www.microsoft.com
A Success Story of How We Seamlessly Migrated CipherTrust Manager to a New Version

Overview  We worked closely with a telecommunication company and guided them in migrating its CipherTrust Manager from …

Published on Thursday January 16, 2025 at www.encryptionconsulting.com
Everything You Need to Know About SSH

In today’s interconnected world, where cyberattacks are constantly increasing, securing remote access to our digital …

Published on Wednesday January 15, 2025 at www.encryptionconsulting.com
Innovating in line with the European Union’s AI Act 

As our Microsoft AI Tour reached Brussels, Paris, and Berlin recently, we met with European organizations that were …

Published on Wednesday January 15, 2025 at blogs.microsoft.com
A TSPs Guide to Remote Signing in SigningHub | Ascertia | Blog

The growing focus on global eCommerce, regulatory compliance and client expectations is creating significant …

Published on Wednesday January 15, 2025 at blog.ascertia.com
Analyzing CVE-2024-44243, a macOS System Integrity Protection bypass through kernel extensions

Microsoft discovered a macOS vulnerability allowing attackers to bypass System Integrity Protection (SIP) by loading …

Published on Monday January 13, 2025 at www.microsoft.com
3 takeaways from red teaming 100 generative AI products

Since 2018, Microsoft's AI Red Team has probed generative AI products for critical safety and security vulnerabilities. …

Published on Monday January 13, 2025 at www.microsoft.com
Navigating the AI Revolution: Top Security Trends for CISOs

The cybersecurity landscape is constantly evolving, and 2025 promises to be a year of unprecedented challenges and …

Published on Monday January 13, 2025 at creaplus.com
Announcing the January 2025 PKI Spotlight® Release

The post Announcing the January 2025 PKI Spotlight® Release appeared first on PKI Solutions.

Published on Friday January 10, 2025 at www.pkisolutions.com
Signing Apple Applications with Codesign Secure and our Apple CSP

Introduction  The applications you find yourself using on your Macintosh (Mac) are .app applications. Applications used …

Published on Friday January 10, 2025 at www.encryptionconsulting.com
Why security teams rely on Microsoft Defender Experts for XDR for managed detection and response

Microsoft Defender Experts for XDR is a mature and proven service that triages, investigates, and responds to incidents …

Published on Monday January 6, 2025 at www.microsoft.com
To Test or Not to Test? That's NOT the Question!

In the face of relentless cyber threats, security testing is not a question of "if" but "how well." By implementing a …

Published on Friday January 3, 2025 at creaplus.com
A success story of transforming security operations with upgrading CipherTrust Manager

Company Overview  The success story of transforming security operations with upgrading CipherTrust Manager revolves …

Published on Thursday January 2, 2025 at www.encryptionconsulting.com
Navigating the EU's Cyber Resilience Act: Strengthening Device Security

The Cyber Resilience Act represents a significant shift in the EU’s approach to digital security. It is not just a …

Published on Thursday January 2, 2025 at creaplus.com
The Autonomous Pentesting Revolution: AI is Reshaping Security

Autonomous pentesting is no longer a luxury—it's a necessity. Organizations that embrace this technology will gain a …

Published on Monday December 30, 2024 at creaplus.com
Pioneering Post-Quantum Security: Three Decades of Technology Innovation

Since founding 01 Communique in 1992, we’ve maintained an unwavering commitment to technological innovation. Today, …

Published on Monday December 30, 2024 at blog.01com.com
01 Communique Positions Itself at the Forefront of Blockchain Security

At 01 Communique, we’ve always believed in staying ahead of technological threats. Today, as quantum computing advances …

Published on Monday December 30, 2024 at blog.01com.com
A Gift and a Curse: The Sacrifices Required to Secure Our Future in the Quantum Age

The extraordinary computational power of quantum computers makes them a double-edged sword. While they have the ability …

Published on Sunday December 29, 2024 at blog.01com.com
Awareness to Action: Proactively Maintaining Resilience in a Quantum World

After 8 years of intense efforts, in response to the increasingly apparent dangers of post-quantum cybersecurity threat, …

Published on Sunday December 29, 2024 at blog.01com.com
Participate in our community discussions and/or join the consortium