News from the PKI Consortium Members

An aggregated list of news published by our members

AI's Rapid Rise: Understanding LLM Vulnerabilities

See what the OWASP Foundation's top 10 vulnerabilities are for large language models. Read More …

Published on Saturday May 4, 2024 at creaplus.com
What is Post Quantum Cryptography and Why Do You Need It? 

Do you know that according to a survey, 71% of IT professionals consider quantum computing a looming threat to …

Published on Saturday May 4, 2024 at www.encryptionconsulting.com
Title: Navigating Risks in Active Directory Certificate Services (ADCS)

The paramount importance of securing sensitive information in an era where data breaches and cyber-attacks are the norm …

Published on Saturday May 4, 2024 at www.encryptionconsulting.com
Strengthening Security with Centralized MFA Integration

The post Strengthening Security with Centralized MFA Integration appeared first on PKI Solutions.

Published on Thursday May 2, 2024 at www.pkisolutions.com
Could RSA be cracked in 2025? – it looks like a strong possibility!

An interesting prediction has come to our attention – the RSA encryption algorithm may be cracked in 2025, which is just …

Published on Thursday May 2, 2024 at blog.01com.com
CA/B Forum and Code Signing

With the constant increase in cyber threats and vulnerability exploitation, online security is necessary to prevent any …

Published on Wednesday May 1, 2024 at www.encryptionconsulting.com
PKI Solutions Featured in Portland Business Journal

The post PKI Solutions Featured in Portland Business Journal appeared first on PKI Solutions.

Published on Tuesday April 30, 2024 at www.pkisolutions.com
CyberNews Q&A Interview

The post CyberNews Q&A Interview appeared first on PKI Solutions.

Published on Tuesday April 30, 2024 at www.pkisolutions.com
Win a Free Online PKI Assessment

The post Win a Free Online PKI Assessment appeared first on PKI Solutions.

Published on Tuesday April 30, 2024 at www.pkisolutions.com
PKI Solutions Expands to Australia & New Zealand

The post PKI Solutions Expands to Australia & New Zealand appeared first on PKI Solutions.

Published on Tuesday April 30, 2024 at www.pkisolutions.com
Reminder: LDAP signing requirements in March 2020

The post Reminder: LDAP signing requirements in March 2020 appeared first on PKI Solutions.

Published on Tuesday April 30, 2024 at www.pkisolutions.com
ASN.1 Editor v1.4 (Christmas Edition)

The post ASN.1 Editor v1.4 (Christmas Edition) appeared first on PKI Solutions.

Published on Tuesday April 30, 2024 at www.pkisolutions.com
Managing Risk from TLS Inspection

The post Managing Risk from TLS Inspection appeared first on PKI Solutions.

Published on Tuesday April 30, 2024 at www.pkisolutions.com
A comprehensive RFP/RFI guide to procuring PKI and digital certificate solutions

The post A comprehensive RFP/RFI guide to procuring PKI and digital certificate solutions appeared first on PKI …

Published on Tuesday April 30, 2024 at www.pkisolutions.com
How to Future-Proof IoT Security

The post How to Future-Proof IoT Security appeared first on PKI Solutions.

Published on Tuesday April 30, 2024 at www.pkisolutions.com
New Risks to Post-Quantum Kyber KEM: What are Timing Attacks and how do they threaten Encryption? 

Quantum-resistant cryptography, Kyber Key Encapsulation Mechanism (KEM), is a promising candidate that can provide …

Published on Tuesday April 30, 2024 at www.encryptionconsulting.com
African eSigning legislation | Ascertia | Blog

Across the African continent, digital transformations are booming. Governments are embracing technology to streamline …

Published on Tuesday April 30, 2024 at blog.ascertia.com
Why Zero Trust is a Must for Strong Corporate Governance

Gone are the days of delegating technology and cybersecurity concerns to be solved solely by... The post Why Zero Trust …

Published on Thursday April 25, 2024 at entrustblog.wpengine.com
Top 10 Supply Chain Attacks that Shook the World

Did you know that between 2019 and 2022, software supply chain attacks skyrocketed by an astounding 742%? The surge in …

Published on Thursday April 25, 2024 at www.encryptionconsulting.com
Sifting through the spines: identifying (potential) Cactus ransomware victims

Authored by Willem Zeeman and Yun Zheng Hu This blog is part of a series written by various Dutch cyber security firms …

Published on Thursday April 25, 2024 at blog.fox-it.com
Ascertia successfully participates in Plugtests | Ascertia | Blog

Ascertia, a leading digital trust solutions provider, is happy to share the results of its participation in one of the …

Published on Wednesday April 24, 2024 at blog.ascertia.com
Preparing for NIS-2 – what you should do now

NIS-2 is on its way The national implementation law for this directive is due to come into force on 18 October 2024, …

Published on Wednesday April 24, 2024 at it-tuv.com
BSI warns of cyber threats

In March, the President of the German Federal Office for Information Security (BSI), Claudia Plattner, visited …

Published on Wednesday April 24, 2024 at it-tuv.com
BMI publishes new draft bill on the CRITIS umbrella law

The first draft bill of the Federal Ministry of the Interior (BMI) for the CRITIS umbrella law was sharply criticised by …

Published on Wednesday April 24, 2024 at it-tuv.com
Hackers target critical infrastructure service providers

For some time now, we have been observing a new wave of cyberattacks, which are particularly strong and primarily target …

Published on Wednesday April 24, 2024 at it-tuv.com
Participate in our community discussions and/or join the consortium