News from the PKI Consortium Members

An aggregated list of news published by our members

Securing your Windows Environment with CodeSign Secure and AppLocker

Securing your environment is very crucial in the current security-driven world. Every enterprise needs to secure their …

Published on Thursday September 12, 2024 at www.encryptionconsulting.com
How to confidently mask PII without missing a single data point?

Protecting sensitive data isn’t just a technical challenge—it’s a balancing act. PII masking is critical to ensuring …

Published on Wednesday September 11, 2024 at accutivesecurity.com
How NIST’s New PQC Algorithms Impact You

The National Institute of Standards and Technology (NIST) has officially released the first three post-quantum …

Published on Tuesday September 10, 2024 at www.encryptionconsulting.com
TrustAsia case study | Ascertia | Blog

TrustAsia, a Chinese Certification Authority, is a partner of Ascertia. It is known throughout China as a leading …

Published on Tuesday September 10, 2024 at blog.ascertia.com
Balancing Privacy and Security: Lessons Learned from Telegram’s Controversy

On Sunday August 25th, 2024, Pavel Durov, the 39-year-old Russian-born billionaire and CEO of Telegram was arrested at a …

Published on Friday September 6, 2024 at blog.01com.com
Everything You Need To Know About PKI-as-a-Service (PKIaaS)

PKI-as-a-service involves deploying and managing an organization’s Public Key Infrastructure (PKI) on a cloud-based …

Published on Friday September 6, 2024 at www.encryptionconsulting.com
Managing Certificate Chaos After Google’s Entrust Distrust

When Google decided to stop trusting new TLS certificates from Entrust, it didn’t just create a technical challenge—it …

Published on Thursday September 5, 2024 at accutivesecurity.com
The Challenges Organizations Face with NIS 2 and DORA

NIS 2 and DORA are undoubtedly a positive development in cyber security. However, they also raise a number of questions …

Published on Sunday September 1, 2024 at creaplus.com
North Korean threat actor Citrine Sleet exploiting Chromium zero-day

Microsoft identified a North Korean threat actor exploiting a zero-day vulnerability in Chromium (CVE-2024-7971) to gain …

Published on Friday August 30, 2024 at www.microsoft.com
The art and science behind Microsoft threat hunting: Part 3

In this blog post, read how Microsoft Incident Response leverages three types of threat intelligence to enhance incident …

Published on Wednesday August 28, 2024 at www.microsoft.com
Data Masking Challenges in Complex Data Environments

As a database administrator, you don’t just maintain systems—you protect your organization’s most sensitive data. With …

Published on Wednesday August 28, 2024 at accutivesecurity.com
Peach Sandstorm deploys new custom Tickler malware in long-running intelligence gathering operations

Between April and July 2024, Microsoft observed Iranian state-sponsored threat actor Peach Sandstorm deploying a new …

Published on Wednesday August 28, 2024 at www.microsoft.com
How Microsoft Entra ID supports US government agencies in meeting identity security requirements

United States Government agencies are adopting Microsoft Entra ID to consolidate siloed identity solutions, reduce …

Published on Monday August 26, 2024 at www.microsoft.com
Microsoft AI Tour: Hear the latest product innovations to elevate your security strategy

The Microsoft AI Tour is coming to a city near you. Join a free, one-day tour event to learn how we are making AI …

Published on Thursday August 22, 2024 at www.microsoft.com
Microsoft again ranked number one in modern endpoint security market share

IDC Worldwide Corporate Endpoint Security Market Shares report for 2023 ranks Microsoft number one in market share with …

Published on Wednesday August 21, 2024 at www.microsoft.com
How to Implement GDPR Data Masking Without Sacrificing Data Usability

If you work with customer data, ensuring GDPR compliance by masking all your PII is crucial. But GDPR data masking is …

Published on Tuesday August 20, 2024 at accutivesecurity.com
AI Performance: Measuring Success Beyond the Hype

AI can be a game-changer, but it's crucial to measure its real impact – the "AI performance" – to ensure investments …

Published on Tuesday August 20, 2024 at creaplus.com
Understanding the Importance of HSMs in Achieving PCI DSS Compliance 

Payment Card Industry Data Security Standard, generally called PCI DSS, is a security standard created to reduce …

Published on Friday August 16, 2024 at www.encryptionconsulting.com
To Revoke or Not to Revoke: Balancing Security with Performance and Operational Complexity

The post To Revoke or Not to Revoke: Balancing Security with Performance and Operational Complexity appeared first on …

Published on Friday August 16, 2024 at www.pkisolutions.com
In-Depth Analysis of FIPS 205: Stateless Hash-Based Digital Signature Standard

The Federal Information Processing Standards Publication (FIPS) 205 introduces a groundbreaking approach to digital …

Published on Tuesday August 13, 2024 at www.encryptionconsulting.com
Understanding FIPS 204: The Module-Lattice-Based Digital Signature Standard 

The Federal Information Processing Standards Publication (FIPS) 204 introduces the Module-Lattice-Based Digital …

Published on Tuesday August 13, 2024 at www.encryptionconsulting.com
Iron Mountain's SigningHub case study | Ascertia | Blog

Iron Mountain was founded over 70 years ago, serving as a strategic partner in storage and information management. It's …

Published on Tuesday August 13, 2024 at blog.ascertia.com
Synthetic vs. Realistic Data for Gen AI & LLM?

How are you training your generative AI models? In AI and machine learning (AI-ML), the type of data you choose can make …

Published on Tuesday August 13, 2024 at accutivesecurity.com
In-Depth Overview of FIPS 203: The Module-Lattice-Based Key-Encapsulation Mechanism Standard

The Federal Information Processing Standards (FIPS) 203 publication introduces the Module-Lattice-Based …

Published on Tuesday August 13, 2024 at www.encryptionconsulting.com
Your Guide to The New Federal Quantum Action Plan

As quantum computing continues to advance, the potential threat it poses to traditional cryptography has become a …

Published on Monday August 12, 2024 at www.encryptionconsulting.com
Participate in our community discussions and/or join the consortium