pkic.org
Open in
urlscan Pro
2606:4700:10::6816:2b41
Public Scan
Submitted URL: https://casecurity.org/
Effective URL: https://pkic.org/
Submission: On August 05 via automatic, source certstream-suspicious — Scanned from DE
Effective URL: https://pkic.org/
Submission: On August 05 via automatic, source certstream-suspicious — Scanned from DE
Form analysis
1 forms found in the DOMjavascript:void(0);
<form class="pagefind-ui__form svelte-e9gkc3" role="search" aria-label="Search this site" action="javascript:void(0);"><input class="pagefind-ui__search-input svelte-e9gkc3" type="text" placeholder="Search" autocapitalize="none" enterkeyhint="search"
autofocus=""> <button class="pagefind-ui__search-clear svelte-e9gkc3 pagefind-ui__suppressed">Clear</button>
<div class="pagefind-ui__drawer svelte-e9gkc3 pagefind-ui__hidden"> </div>
</form>
Text Content
Home About us Blog Members Resources Sponsors > Clear PUBLIC KEY INFRASTRUCTURE CONSORTIUM (PKI CONSORTIUM) Trusted digital assets and communication for everyone and everything The slides and recordings of the presentations at our second Post-Quantum Cryptography Conference are now accessible for your reference. Click on the title of the session in the agenda to download the slides. PKI CONSORTIUM The PKI Consortium is comprised of leading organizations that are committed to improve, create and collaborate on generic, industry or use-case specific policies, procedures, best practices, standards and tools that advance trust in assets and communication for everyone and everything using Public Key Infrastructure (PKI) as well as the security of the internet in general. By engaging with users, regulators, supervisory bodies and other interested or relying parties the consortium can address actual issues. [learn more…] PUBLIC KEY INFRASTRUCTURE Public Key Infrastructure (PKI) defines the foundation for most modern security systems and provides Confidentiality, Integrity, Authenticity and Non-repudiation. It relies on public key cryptography, a universally accepted asymmetric technology that enables entities to securely communicate using an insecure transport or media, reliably link the data to the signatory and protects the integrity of the data while proving guarantees about the existence of the data at the time of signature creation. A list of cryptographic devices that includes support for remote key attestations March 22, 2024 by Tomas Gustavsson (Keyfactor) Remote Key Attestation The PKI Consortium is managing a a list of cryptographic devices that includes support for remote key attestations, without endorsing their implementation or quality. Second Post-Quantum Cryptography Conference: Register now to join us in Amsterdam or Online! August 31, 2023 by Paul van Brouwershaven (Digitorus) Paul van Brouwershaven (Entrust) Conference Post-Quantum Cryptography PQC Join us on November 7 and 8, either in-person at the Meervaart in Amsterdam or remotely online. Explore the forefront of Post-Quantum Cryptography with renowned speakers from NIST, ENISA, BSI, and more. Registration is free and open to all, not limited to PKI Consortium members. Introducing first PKI Maturity Model (PKIMM) August 10, 2023 by Roman Cinkais (3Key Company) Maturity model PKIMM The PKI Consortium publishes initial draft of the PKI maturity model with related resources to help the industry build mature and future proof PKI including guidelines on how to evaluate the assessment and provide reporting to relying parties. The PKI maturity model is recognized as a standard for evaluation, planning, and comparison between different PKI implementations. In this blog post we are going to introduce the model. More on the PKI Consortium blog We thank our sponsors for their ongoing support of the PKI Consortium Previous REGULATORY COMPLIANCE 101: LAWS, REQUIREMENTS & BEST PRACTICES Every day, our personal data is gathered and stored on electronic devices. From our sensitive financial information to our health records, everything gets stored on these devices. This makes the security of these devices an imperative step and that’s where regulatory compliance plays an instrumental role in ensuring that organizations from around the world are […] Published on Saturday August 3, 2024 at www.encryptionconsulting.com FIREFOX’S MOZILLA FOLLOWS GOOGLE IN DISTRUSTING ENTRUST’S TLS CERTIFICATES Mozilla has announced it will officially stop trusting Entrust as a root certificate authority (CA) starting November 30, 2024, due to a prolonged period of compliance failures. This decision follows a similar move by Google Chrome, which cut ties with Entrust a month earlier, citing a pattern of concerning behaviors. Google’s Initial Decision In June […] Published on Friday August 2, 2024 at www.encryptionconsulting.com STATE OF QUANTUM READINESS 2024 State of Quantum Readiness 2024 – Accutive Security + Keyfactor Keyfactor and Accutive Security dive into the key challenges obstructing progress on Post Quantum Readiness in 2024. Accutive Security and Keyfactor delve into the state of Post-Quantum Readiness in 2024. This insightful report tackles challenges and roadblocks to PQC readiness with clear tips for crypto […] The post State of Quantum Readiness 2024 first appeared on Accutive Security. Published on Friday August 2, 2024 at accutivesecurity.com LESSONS FROM DIGICERT’S MASS CERTIFICATE REVOCATION In recent cybersecurity news, DigiCert has made headlines with a significant certificate revocation event affecting more than 83,000 certificates across nearly 7,000 customers. This incident underscores the critical need for robust certificate management practices and crypto-agility to swiftly address and mitigate security vulnerabilities. Understanding Certificate Revocation and Its Impact The recent DigiCert incident has highlighted […] Published on Friday August 2, 2024 at www.encryptionconsulting.com HEADING TO BLACK HAT 2024 – PKI SPOTLIGHT GROWTH! The post Heading to Black Hat 2024 – PKI Spotlight Growth! appeared first on PKI Solutions. Published on Thursday August 1, 2024 at www.pkisolutions.com PKI INSIGHTS RECAP – PAST, PRESENT, AND FUTURE OF PKI WITH BRIAN KOMAR The post PKI Insights Recap – Past, Present, and Future of PKI with Brian Komar appeared first on PKI Solutions. Published on Thursday August 1, 2024 at www.pkisolutions.com INTRODUCTION TO CERTSECURE MANAGER: ENCRYPTION CONSULTING’S FLAGSHIP CERTIFICATE MANAGEMENT SOLUTION Certificates have become a key component in today’s cyberspace where each component requires a certificate to confirm its identity. From users to servers to applications, every part of the organization requires a certificate to function as intended. While this enhances the Organization’s overall security, as the organization grows it becomes difficult to manage such certificates […] Published on Thursday August 1, 2024 at www.encryptionconsulting.com APAC’S DIGITAL TRUST REGULATORY LANDSCAPE | ASCERTIA | BLOG The Asia Pacific (APAC) region is experiencing a digital boom, fuelled by a rapidly growing online population and a surge in eCommerce. The region’s digital transformation hinges on trust – trust that online transactions are secure, data is protected and identities are verified. Published on Wednesday July 31, 2024 at blog.ascertia.com MEETING CODE SIGNING COMPLIANCE AND ENHANCING SECURITY WITH CODE SIGNING SOLUTION Securing software is extremely important in the interconnected world in which our industries operate. Every organization today needs to protect each and every piece of software inside their organization from rising digital threats and increasing incidents of software tampering. This is where code signing comes into play. Code signing is the process of attaching a […] Published on Tuesday July 30, 2024 at www.encryptionconsulting.com YOUR GUIDE TO DO A PKI HEALTH CHECK PKI health check is a thorough review of your current Public Key Infrastructure (PKI) to ensure it is working properly, securely, and efficiently. It helps in discovering areas that need to be improved and vulnerabilities and inefficiencies that may exist thereby making sure your PKI aligns with the present-day security requirements and best practices. Key […] Published on Thursday July 25, 2024 at www.encryptionconsulting.com ORACLE DATA MASKING: ORACLE ENTERPRISE VS. ALTERNATIVES Oracle Database Overview For decades, Oracle has been a leader in the database management system space with a powerful suite of database tools. Oracle Database is a robust and highly scalable relational database management system (RDBMS) widely used for enterprise applications. It operates on a structured framework where data is organized into tables, which are […] The post Oracle Data Masking: Oracle Enterprise vs. Alternatives first appeared on Accutive Security. Published on Wednesday July 24, 2024 at accutivesecurity.com THE »HACKER MINDSET« MYTH: WHY CYBERSECURITY NEEDS A NEW HERO The cybersecurity field has long been captivated by the concept of "thinking like a hacker." Read More … Published on Wednesday July 24, 2024 at creaplus.com SIGNINGHUB SUPPORTS SIGNATURE TABLETS FOR FACE-TO-FACE MEETINGS Not so long ago, working from home was mandatory, travelling across borders was almost unthinkable and meeting someone for coffee required careful consideration of risk versus reward. Published on Tuesday July 23, 2024 at blog.ascertia.com CASE STUDY: WHY MISA USES ASCERTIA TECHNOLOGY MISA Vietnam Joint Stock Company is one of the leading providers of information technology solutions. It has 30 years of experience developing platforms, software and IT services. Published on Wednesday July 17, 2024 at blog.ascertia.com ENTERPRISE CRYPTOGRAPHIC SERVICES Does this sound familiar? You are working at a company on a big project and are just about ready to move to production but need to add the final touches. You are told that you need TLS certificates for your load balancers, application servers, and database servers, a secure place to bootstrap some secrets from, […] The post Enterprise Cryptographic Services appeared first on Garantir. Published on Tuesday July 16, 2024 at garantir.io DIGITAL SIGNATURE ADOPTION AND CHALLENGES IN ASIA | ASCERTIA | BLOG In a recent #AscertiaOn episode, Larry Lee, a product specialist from Netrust, provided insightful perspectives on the evolving landscape of digital signatures in Asia. Published on Tuesday July 16, 2024 at blog.ascertia.com API ACCESS CONTROL: OPTIMIZING YOUR API SECURITY In the digital transformation era, APIs have become the glue that holds modern tech stacks together. APIs are critical for enabling seamless communication and data exchange between systems. However; the rise of API usage also presents significant security challenges. Effective API access control is the foundation element to protect sensitive data, ensure compliance, and maintain […] The post API Access Control: Optimizing your API Security first appeared on Accutive Security. Published on Monday July 15, 2024 at accutivesecurity.com UNIFIED COMMUNICATION ADMINISTRATOR – ALTERNATIV CONTAINERIZATION EXPERT Unified Communication Administrator alternativ Containerization expert Responsibilities: – Develop and maintain comprehensive UC solutions including VoIP, video conferencing, instant messaging, and presence and collaboration tools. – Evaluate existing UC Infrastructure and propose enhancements or upgrades to optimize performance and efficiency. – Lead the implementation of UC projects from conception to completion, ensuring alignment with industry … „Unified Communication Administrator – Alternativ Containerization expert“ weiterlesen Published on Friday July 12, 2024 at datawh.info TRANSFORMATIONAL DIGITAL SIGNING FOR BUSINESSES | ASCERTIA | BLOG Over the last decade, the world’s businesses have embraced digital technology, relying less and less on traditional signing methods. Companies worldwide are adopting digital transformations to enhance efficiency, security and compliance. Published on Monday July 8, 2024 at blog.ascertia.com HOW TO IMPROVE SECURITY USING CENTRALIZED MULTI-FACTOR AUTHENTICATION (MFA)? Data breaches are happening more frequently than ever before, making organizations’ security defenses weaker and requiring continuous updates in their strategic planning and security measures to keep the constantly advancing threats at bay. In just 2023, there were an estimated 2,814 incidents of data breaches, according to IT Governance. A study by the Harvard Business Review shows that these incidents of […] Published on Thursday July 4, 2024 at www.encryptionconsulting.com DETAILED GUIDE TO MEETING NIST SP 1800-16 COMPLIANCE NIST SP͏ 1800-16 has recently released their new ͏͏guidelines for managing TLS certificates. The core emphasis has been put on preventing, detecting and recovering from certificate-related incidents that are becoming increasing commonly these days. These guidelines help organizations to navigate a secure roadmap for implementing effective TLS certificate management programs to avoid risks and maintain a […] Published on Wednesday July 3, 2024 at www.encryptionconsulting.com HOW TO AUTOMATE F5 CERTIFICATE MANAGEMENT Whether you’re running a small business website, a complex enterprise application, or a cloud-based service, your users expect seamless, uninterrupted access. This is where load balancers come into play, and among the most trusted names in this domain is F5 Networks. But manual certificate management on an F5 device can be pretty hectic considering the […] Published on Wednesday July 3, 2024 at www.encryptionconsulting.com THE HIDDEN RISKS OF EXPIRED CERTIFICATE REVOCATION LISTS (CRL) Digital certificates play a crucial role in web security and public key infrastructure, ensuring secure internet communication. These certificates act like digital identifications that verify a website’s legitimacy. Now, consider a scenario where you try to access a website, but unknown to you, the certificate validating this site has been compromised. This oversight opens a […] Published on Tuesday July 2, 2024 at www.encryptionconsulting.com WHAT IS YOUR ONBOARDING PROCESS TELLING YOUR CUSTOMERS? What is Your Onboarding Process Telling Your Customers? HID + Accutive Security’s Guide to Modernized Identity Verification for Financial Institutions Download PDF Read on Website The post What is Your Onboarding Process Telling Your Customers? first appeared on Accutive Security. Published on Wednesday June 26, 2024 at accutivesecurity.com BUSINESS APPLICATION INTEGRATIONS: SIMPLIFY YOUR WORKFLOWS Imagine a workplace where people navigate tasks effortlessly, context and application switching ceases, data transfers become invisible, and productivity flows. Published on Tuesday June 25, 2024 at blog.ascertia.com Next Participate in our community discussions and/or join the consortium Improve this page Become a member | Bylaws | Code of Conduct | IPR Agreement | List of members | News from our members | Working groups Decisions within the PKI Consortium are taken by substantial consensus of the members as specified in our bylaws. Substantial consensus among members does not necessarily mean that all members share the same view or opinion. © 2024 PKI Consortium, Inc. All Rights Reserved