Unauthorized access, unsigned applications (malware) and unsecured email. What can help prevent these top 3 cyberthreats impacting organizations today? Public key infrastructure (PKI). Mark explains PKI and authentication in an article in ISACA’s The Nexus. I like his analogy describing PKI as “a virtual, encrypted handshake.”Read More
We work in a bring-your-own-devices (BYOD) culture, which raises questions and challenges around identity and access management. Mark was interviewed by Solutions Review about BYOD security issues and what organizations can do. Check out the Q&A.Read More
According to Pew Research Center, 84 percent of adults rely primarily on memorization or pen and paper to store passwords. But we know that storing passwords on paper could lead to exposure. Instead, using a complex password, combined with password management, and two-factor or multi-factorRead More
Microsoft just released their official statement and support for Certificate Transparency. I will be writing a full article covering this update as there are several key areas that are lacking in the Microsoft documentation. So in the interest of spreading the word on the officialRead More
PKI Solutions offers a complete set of PKI consulting, training, professional services, support and assessments with a particular emphasis on Microsoft Active Directory Certificate Services. As the demand for cybersecurity and the increased protection offered by PKI technologies continues to grow in the enterprise andRead More
A common question I often get from customers and students is about Microsoft’s Cryptographic Service Providers (CSP). The CSPs are responsible for creating, storing and accessing cryptographic keys – the underpinnings of any certificate and PKI. These keys can be symmetric or asymmetric, RSA, Elliptical KeyRead More
We’re pleased to announce that we’re unveiling our new company logo on our website today. The PKIGuy and the rest of the team here are excited to welcome you to our first-ever PKI Solutions logo contest!
Since cryptography is the art of writing and
In my last blog post (Backing up ADCS Certificate Authorities Part 1) I covered the inner workings of how ADCS and the Jet database works to maintain the CA data. In this post I am going to go over a comprehensive PowerShell script that IRead More
One of the areas I have spoken about extensively at conferences and cover in my training classes is the unique issues associated with backing up and managing your ADCS Certificate Authority. There are several items I would like to address in this two-part series:
It’s here, the 2018 PKI Training schedule is now live and accepting registrations. There are three In-Depth classes and three Advanced PKI classes split between the US and Europe. Be sure to check out the schedule and register early as classes usually sell-out in advance.