We are the experts in PKI consulting, training, and support
If you would like more information about PKI or other related industry topics such as encryption, identity management, or two-factor authentication—or to schedule an interview with Mark B. Cooper, please contact Kelly Stremel at McKenzie Worldwide.
In the News
February 8, 2019
The Benefits of Correctly Deploying a PKI Solution
With new threats to data emerging, public key infrastructure (PKI) has become an increasingly larger part of enterprises’ information security and risk management strategies...
January 17, 2019
PKI Deployment: The 10 Definitive Answers
Public key infrastructure (PKI) is more important than ever, as organizations are doing a less-than-stellar job protecting their users’ data from inadvertent exposure, such as exposed APIs or poor authentication...
December 17, 2018
Shhhhh! The Secret to Secrets Management
Companies need to take a centralized approach to protecting confidential data and assets. Here are 12 ways to get a handle on the problem. Organizations in all industries have secrets that need to be protected...
December 13, 2018
Cryptocurrency and the Need for Trust
For the first time in modern history, our civilization is on the verge of a new concept in monetary transactions with cryptocurrency. Cryptocurrency could be hugely disruptive to many industries and could...
November 26, 2018
Threats and Encryption in 2019, a Q&A
What data privacy concerns await enterprises in 2019? What encryption will enterprises need to employ? What threats will they face? To gain some valuable perspective on these questions, we spoke to Mark B. Cooper...
November 11, 2018
Digital Currency and the Need for Trust
For the first time in modern history, our civilization is on the verge of a new concept in monetary transactions with cryptocurrency. Cryptocurrency could be hugely disruptive to many industries...
November 5, 2018
The Evolving Sense of Trust in the Age of Cryptocurrency
Cryptocurrency could completely change the money transfer services industries, but we need trust to be at the cornerstone before it can gain wide acceptance and be legitimized.
November 1, 2018
How to Make Informed Risk Management Decisions about What to Store in the Cloud
With cyber threats evolving, cloud servers are a major target and more than 80 percent of organizations store their information in the public cloud...
September 10, 2018
Cloud Insecurity: The Need for Stronger Identity Management
With cloud usage growing exponentially, are we asking enough questions about cloud security for organizations to make informed risk management decisions?
July 9, 2018
Boost Security in Your Organization with Tactical Two-Factor Authentication
For business applications, two-factor authentication is a must and can provide significant security improvements beyond passwords.
May 14, 2018
PKI Explained: Why it is Necessary and Relevant Now More Than Ever
Unauthorized access, unsigned applications (malware) and unsecured email. What can help prevent these top 3 cyberthreats impacting organizations today?
April 11, 2018
Stay Safer Online with Two-Factor Identification
In a well-intentioned effort to help us stay safer online, most online sites and services that involve a login to protect sensitive or personal data and information are now encouraging...
March 28, 2018
4 Questions on BYOD Culture with Mark Cooper of PKI Solutions
Bring-your-own-devices culture (BYOD) is sweeping enterprises around the world, bringing a flood of innovations and cybersecurity concerns.
March 28, 2018
3 Questions on the Internet of Things (IOT) with Mark Cooper of PKI Solutions
The Internet of Things has proven a recurring security challenge in the modern workplace, as the devices typically lack any sort of security platform.
Feb 12, 2018
Oregon Cybersecurity Experts Issue Predictions for 2018
Cybersecurity catastrophes like Equifax’s massive data breach, which exposed the personal information of more than 145 million people, may be behind us, but it’s clear...