Category: PKI

Authentication ISACA Permissions PKI

PKI Explained: Why It Is Necessary and Relevant Now More Than Ever

Unauthorized access, unsigned applications (malware) and unsecured email. What can help prevent these top 3 cyberthreats impacting organizations today? Public key infrastructure (PKI). Mark explains PKI and authentication in an article in ISACA’s The Nexus. I like his analogy describing PKI as “a virtual, encrypted handshake.”

Read More
  • May 16, 2018

BYOD PKI

BYOD Raises Challenges Around Identity and Access Management

We work in a bring-your-own-devices (BYOD) culture, which raises questions and challenges around identity and access management. Mark was interviewed by Solutions Review about BYOD security issues and what organizations can do. Check out the Q&A.

Read More
  • April 18, 2018

Authentication PKI

Stay Safer Online With Two-Factor Authentication

According to Pew Research Center, 84 percent of adults rely primarily on memorization or pen and paper to store passwords. But we know that storing passwords on paper could lead to exposure. Instead, using a complex password, combined with password management, and two-factor or multi-factor

Read More
  • April 12, 2018

PKI

Microsoft ADCS Certificate Transparency Support

Microsoft just released their official statement and support for Certificate Transparency. I will be writing a full article covering this update as there are several key areas that are lacking in the Microsoft documentation. So in the interest of spreading the word on the official

Read More
  • March 26, 2018

PKI

PKI Solutions is hiring talented PKI professionals

PKI Solutions offers a complete set of PKI consulting, training, professional services, support and assessments with a particular emphasis on Microsoft Active Directory Certificate Services. As the demand for cybersecurity and the increased protection offered by PKI technologies continues to grow in the enterprise and

Read More
  • March 13, 2018

Certificate Templates Crypto Providers Enrollment PKI Trusted Platform Modules (TPM)

Understanding Microsoft Cryptographic Service Providers

A common question I often get from customers and students is about Microsoft’s Cryptographic Service Providers (CSP). The CSPs are responsible for creating, storing and accessing cryptographic keys – the underpinnings of any certificate and PKI. These keys can be symmetric or asymmetric, RSA, Elliptical Key

Read More
  • February 28, 2018

PKI The PKI CryptoGram

PKI Solutions logo contest!

We’re pleased to announce that we’re unveiling our new company logo on our website today. The PKIGuy and the rest of the team here are excited to welcome you to our first-ever PKI Solutions logo contest!
Since cryptography is the art of writing and

Read More
  • February 23, 2018

Backups Database Hardware Security Modules Hotfixes Maintenance Offline CA PKI

Backing up ADCS Certificate Authorities (Part 2 of 2)

In my last blog post (Backing up ADCS Certificate Authorities Part 1) I covered the inner workings of how ADCS and the Jet database works to maintain the CA data. In this post I am going to go over a comprehensive PowerShell script that I

Read More
  • January 11, 2018

Backups Database Hardware Security Modules Hotfixes Maintenance Offline CA PKI

Backing up ADCS Certificate Authorities (Part 1 of 2)

One of the areas I have spoken about extensively at conferences and cover in my training classes is the unique issues associated with backing up and managing your ADCS Certificate Authority. There are several items I would like to address in this two-part series:

CA

Read More
  • December 14, 2017

PKI

2018 Training Class Schedule

It’s here, the 2018 PKI Training schedule is now live and accepting registrations. There are three In-Depth classes and three Advanced PKI classes split between the US and Europe. Be sure to check out the schedule and register early as classes usually sell-out in advance.
Read More

  • October 25, 2017

  © Copyright 2013-2018 PKI Solutions Inc. // All Rights Reserved // Terms of Service // Privacy Policy // Pricing and Refund Policies