Q&A with J.J. Stapleton, co-author of Security without Obscurity: A Guide to PKI Operations
TPG: What practical advice do you have for an organization considering deploying a PKI solution?
JS: There are various PKI architectures to consider. An internal private PKI deployed wholly within the organization, a hosted private PKI deployed at a third-party service provider, or an external public PKI operated by a commercial third party. Each has pros and cons…Read More
Q&A with Bruno Couillard, president and CTO, Crypto4A TPG: Your hardware security module (HSM) architecture team has an interesting history in the world of cryptography—can you tell us about that? BC: Many of our team, (including myself and the other three founders) have been consistently in the crypto and cybersecurity space for decades. Some of…Read More
A common question asked in our classes when we cover object identifiers (OIDs) is if there is a list of all the OIDs in a PKI environment. An object identifier is a string of decimal numbers that uniquely identifies an object. Since it isn’t a quick answer, I created this post to go a little…Read More
Q&A with Kevin von Keyserling, CEO and co-founder, Keyfactor TPG: Tell us about Keyfactor. KvK: We’re a digital identity software company that provides end-to-end authentication, encryption, and signing technologies that safeguard data, devices, applications, and people. Our platform allows our clients to master every digital identity within their organization quickly, easily and cost-effectively. Up until a…Read More
Q&A with Alexander Truskovsky, senior product manager, ISARA Corporation TPG: Tell us about ISARA. AT: ISARA Corporation is a cybersecurity company specializing in creating production-ready quantum-safe solutions for today’s computing ecosystems. We enable OEMs to achieve a seamless migration to next-generation security measures by embedding our optimized quantum-safe algorithms and unique crypto-agile technology. We actively…Read More