The PKI Guy Blog

The PKI Guy talks digital identity with Kevin von Keyserling of Keyfactor

By Mark B. Cooper aka "The PKI Guy" | Nov 26, 2018

Q&A with Kevin von Keyserling, CEO and co-founder, Keyfactor TPG: Tell us about Keyfactor. KvK: We’re a digital identity software company that provides end-to-end authentication, encryption, and signing technologies that safeguard data, devices, applications, and people. Our platform allows our clients to master every digital identity within their organization quickly, easily and cost-effectively. Up until a…

Read More

The Evolving Sense of Trust in the Age of Cryptocurrency

By Kelly Stremel | Nov 6, 2018

With the rise of cryptocurrency, how we perceive the notion of trust is changing. Will cryptocurrency change our perception of trustworthy persons? Do we need to redefine and profile how we investigate and control personnel with digital currency? Mark’s premise is that we need trust to be the cornerstone before digital currency can gain wide…

Read More

How to Make Informed Risk Management Decisions About What to Store in the Cloud

By Kelly Stremel | Nov 6, 2018

There are risk management issues with the cloud. In his article, Mark discusses how organizations need to proceed with caution about what they store, outlines security risks, and makes recommendations. Check out his latest article in Security Magazine.

Read More

The PKI Guy discusses digital certificates security with Muralidharan Palanisamy of AppViewX

By Mark B. Cooper aka "The PKI Guy" | Oct 18, 2018

Q&A with Muralidharan Palanisamy, chief solutions officer, AppViewX TPG: Tell us a little bit about AppViewX. MP: AppViewX is revolutionizing the way NetOps and SecOps teams deliver services to Enterprise IT. We have a modular, low-code software platform that enables the automation and orchestration of network and security infrastructure using an intuitive, context-aware, visual workflow. TPG: What…

Read More

Mark Speaking at BSides PDX on October 27

By Kelly Stremel | Oct 15, 2018

Join Mark B. Cooper, president and founder of PKI Solutions, at this year’s BSides PDX, a gathering of the most interesting infosec minds in Portland and the Pacific Northwest. Mark will give a special presentation on “The Secret to Secrets Management” on Saturday, October 27, 2018 from 12:00 p.m. to 1:00 pm. In his presentation,…

Read More

Cloud Insecurity: The Need for Stronger Identity Management

By Kelly Stremel | Sep 10, 2018

With cloud usage growing exponentially, are we asking enough questions about cloud security for organizations to make informed risk management decisions? Mark addresses these issues, including should you entrust your private keys in the cloud? Check out his latest article in ISACA’s The Nexus.  

Read More

The PKI Guy talks quantum-safe security with Alexander Truskovsky of ISARA Corporation

By Mark B. Cooper aka "The PKI Guy" | Aug 1, 2018

Q&A with Alexander Truskovsky, senior product manager, ISARA Corporation TPG: Tell us about ISARA.  AT: ISARA Corporation is a cybersecurity company specializing in creating production-ready quantum-safe solutions for today’s computing ecosystems. We enable OEMs to achieve a seamless migration to next-generation security measures by embedding our optimized quantum-safe algorithms and unique crypto-agile technology. We actively…

Read More

MS Press Server 2008 PKI Book Errata launch

By Mark B. Cooper aka "The PKI Guy" | Jul 16, 2018

For many years I’ve been tracking the corrections and issues in the last Microsoft Press Windows Server 2008 PKI book. All of these items have previously been incorporated into our standard deployment and consulting engagements as well as baked into our training courses. But I’ve long wanted to post an unofficial errata list for the…

Read More

Boost Security in Your Organization with Tactical Two-Factor Authentication

By Kelly Stremel | Jul 10, 2018

For business applications, two-factor authentication is a must, especially for any employee or user accounts that have access to sensitive applications or customer information. Mark explains how automating and integrating two-factor authentication technology is a vital step to guarding against security breaches. Check out his latest article in ISACA’s The Nexus.

Read More