cybersecurity

The PKI Guy drills down on PKI operations with Jeff Stapleton, author

Q&A with J.J. Stapleton, co-author of Security without Obscurity: A Guide to PKI Operations

TPG: What practical advice do you have for an organization considering deploying a PKI solution?

JS: There are various PKI architectures to consider. An internal private PKI deployed wholly within the organization, a hosted private PKI deployed at a third-party service provider, or an external public PKI operated by a commercial third party. Each has pros and cons…

Read More

The PKI Guy explores quantum-ready solutions with Bruno Couillard of Crypto4A

Q&A with Bruno Couillard, president and CTO, Crypto4A TPG: Your hardware security module (HSM) architecture team has an interesting history in the world of cryptography—can you tell us about that? BC: Many of our team, (including myself and the other three founders) have been consistently in the crypto and cybersecurity space for decades. Some of…

Read More

7 Top Cybersecurity Trends in 2019

Forty-three percent of businesses were a victim of a cybersecurity breach in the past year, based on the recent Cyber Security Breaches Survey 2018. Organizations are continuing to do a less than stellar job protecting their users’ data from inadvertent exposure, such as exposed APIs, poor authentication, etc. In fact, 4.5 billion data records were…

Read More

The Evolving Sense of Trust in the Age of Cryptocurrency

With the rise of cryptocurrency, how we perceive the notion of trust is changing. Will cryptocurrency change our perception of trustworthy persons? Do we need to redefine and profile how we investigate and control personnel with digital currency? Mark’s premise is that we need trust to be the cornerstone before digital currency can gain wide…

Read More