CA/B Forum and Code Signing
With the constant increase in cyber threats and vulnerability exploitation, online security is necessary to prevent any …
Published on Wednesday May 1, 2024 at www.encryptionconsulting.comPKI Solutions Featured in Portland Business Journal
The post PKI Solutions Featured in Portland Business Journal appeared first on PKI Solutions.
Published on Tuesday April 30, 2024 at www.pkisolutions.comCyberNews Q&A Interview
The post CyberNews Q&A Interview appeared first on PKI Solutions.
Published on Tuesday April 30, 2024 at www.pkisolutions.comWin a Free Online PKI Assessment
The post Win a Free Online PKI Assessment appeared first on PKI Solutions.
Published on Tuesday April 30, 2024 at www.pkisolutions.comPKI Solutions Expands to Australia & New Zealand
The post PKI Solutions Expands to Australia & New Zealand appeared first on PKI Solutions.
Published on Tuesday April 30, 2024 at www.pkisolutions.comReminder: LDAP signing requirements in March 2020
The post Reminder: LDAP signing requirements in March 2020 appeared first on PKI Solutions.
Published on Tuesday April 30, 2024 at www.pkisolutions.comASN.1 Editor v1.4 (Christmas Edition)
The post ASN.1 Editor v1.4 (Christmas Edition) appeared first on PKI Solutions.
Published on Tuesday April 30, 2024 at www.pkisolutions.comManaging Risk from TLS Inspection
The post Managing Risk from TLS Inspection appeared first on PKI Solutions.
Published on Tuesday April 30, 2024 at www.pkisolutions.comA comprehensive RFP/RFI guide to procuring PKI and digital certificate solutions
The post A comprehensive RFP/RFI guide to procuring PKI and digital certificate solutions appeared first on PKI …
Published on Tuesday April 30, 2024 at www.pkisolutions.comHow to Future-Proof IoT Security
The post How to Future-Proof IoT Security appeared first on PKI Solutions.
Published on Tuesday April 30, 2024 at www.pkisolutions.comPowerShell PKI Module v3.4.2 and upcoming plans
The post PowerShell PKI Module v3.4.2 and upcoming plans appeared first on PKI Solutions.
Published on Tuesday April 30, 2024 at www.pkisolutions.comNew Risks to Post-Quantum Kyber KEM: What are Timing Attacks and how do they threaten Encryption?
Quantum-resistant cryptography, Kyber Key Encapsulation Mechanism (KEM), is a promising candidate that can provide …
Published on Tuesday April 30, 2024 at www.encryptionconsulting.comAfrican eSigning legislation | Ascertia | Blog
Across the African continent, digital transformations are booming. Governments are embracing technology to streamline …
Published on Tuesday April 30, 2024 at blog.ascertia.comWhy Zero Trust is a Must for Strong Corporate Governance
Gone are the days of delegating technology and cybersecurity concerns to be solved solely by... The post Why Zero Trust …
Published on Thursday April 25, 2024 at entrustblog.wpengine.comTop 10 Supply Chain Attacks that Shook the World
Did you know that between 2019 and 2022, software supply chain attacks skyrocketed by an astounding 742%? The surge in …
Published on Thursday April 25, 2024 at www.encryptionconsulting.comSifting through the spines: identifying (potential) Cactus ransomware victims
Authored by Willem Zeeman and Yun Zheng Hu This blog is part of a series written by various Dutch cyber security firms …
Published on Thursday April 25, 2024 at blog.fox-it.comAscertia successfully participates in Plugtests | Ascertia | Blog
Ascertia, a leading digital trust solutions provider, is happy to share the results of its participation in one of the …
Published on Wednesday April 24, 2024 at blog.ascertia.comPreparing for NIS-2 – what you should do now
NIS-2 is on its way The national implementation law for this directive is due to come into force on 18 October 2024, …
Published on Wednesday April 24, 2024 at it-tuv.comBSI warns of cyber threats
In March, the President of the German Federal Office for Information Security (BSI), Claudia Plattner, visited …
Published on Wednesday April 24, 2024 at it-tuv.comBMI publishes new draft bill on the CRITIS umbrella law
The first draft bill of the Federal Ministry of the Interior (BMI) for the CRITIS umbrella law was sharply criticised by …
Published on Wednesday April 24, 2024 at it-tuv.comHackers target critical infrastructure service providers
For some time now, we have been observing a new wave of cyberattacks, which are particularly strong and primarily target …
Published on Wednesday April 24, 2024 at it-tuv.comBiometrics: A Flash Point in AI Regulation
According to proprietary verification data from Onfido (now a part of Entrust), deepfakes rose 3000%... The post …
Published on Monday April 22, 2024 at entrustblog.wpengine.comSoon to be Deprecated – Are you still using RSA 1024 Bit Keys for Windows?
Microsoft has announced that it will depreciate Windows RSA keys shorter than 2048 bits. This step encourages …
Published on Friday April 19, 2024 at www.encryptionconsulting.comWhy Adapt to the Evolving Matrix of X.509 Certificates with CA/Browser Forum Standards
Did you know that only 46% of organizations secured all their digital certificates and keys? As the data suggests, …
Published on Thursday April 18, 2024 at www.encryptionconsulting.comUpgrading the Software and Firmware of a PED-Based Thales Network HSM
Hardware Security Modules, or HSMs, can be a complicated, but important, piece of security infrastructure to maintain. …
Published on Wednesday April 17, 2024 at www.encryptionconsulting.com