pkic.org Open in urlscan Pro
2606:4700:10::6816:2b41  Public Scan

Submitted URL: https://casecurity.org/
Effective URL: https://pkic.org/
Submission: On August 05 via automatic, source certstream-suspicious — Scanned from DE

Form analysis 1 forms found in the DOM

javascript:void(0);

<form class="pagefind-ui__form svelte-e9gkc3" role="search" aria-label="Search this site" action="javascript:void(0);"><input class="pagefind-ui__search-input svelte-e9gkc3" type="text" placeholder="Search" autocapitalize="none" enterkeyhint="search"
    autofocus=""> <button class="pagefind-ui__search-clear svelte-e9gkc3 pagefind-ui__suppressed">Clear</button>
  <div class="pagefind-ui__drawer svelte-e9gkc3 pagefind-ui__hidden"> </div>
</form>

Text Content

Home About us Blog Members Resources Sponsors
>
Clear



PUBLIC KEY INFRASTRUCTURE CONSORTIUM (PKI CONSORTIUM)

Trusted digital assets and communication for everyone and everything

The slides and recordings of the presentations at our second Post-Quantum
Cryptography Conference are now accessible for your reference. Click on the
title of the session in the agenda to download the slides.


PKI CONSORTIUM

The PKI Consortium is comprised of leading organizations that are committed to
improve, create and collaborate on generic, industry or use-case specific
policies, procedures, best practices, standards and tools that advance trust in
assets and communication for everyone and everything using Public Key
Infrastructure (PKI) as well as the security of the internet in general. By
engaging with users, regulators, supervisory bodies and other interested or
relying parties the consortium can address actual issues. [learn more…]


PUBLIC KEY INFRASTRUCTURE

Public Key Infrastructure (PKI) defines the foundation for most modern security
systems and provides Confidentiality, Integrity, Authenticity and
Non-repudiation. It relies on public key cryptography, a universally accepted
asymmetric technology that enables entities to securely communicate using an
insecure transport or media, reliably link the data to the signatory and
protects the integrity of the data while proving guarantees about the existence
of the data at the time of signature creation.

A list of cryptographic devices that includes support for remote key
attestations
March 22, 2024 by Tomas Gustavsson (Keyfactor) Remote Key Attestation
The PKI Consortium is managing a a list of cryptographic devices that includes
support for remote key attestations, without endorsing their implementation or
quality.

Second Post-Quantum Cryptography Conference: Register now to join us in
Amsterdam or Online!
August 31, 2023 by Paul van Brouwershaven (Digitorus) Paul van Brouwershaven
(Entrust) Conference Post-Quantum Cryptography PQC
Join us on November 7 and 8, either in-person at the Meervaart in Amsterdam or
remotely online. Explore the forefront of Post-Quantum Cryptography with
renowned speakers from NIST, ENISA, BSI, and more. Registration is free and open
to all, not limited to PKI Consortium members.

Introducing first PKI Maturity Model (PKIMM)
August 10, 2023 by Roman Cinkais (3Key Company) Maturity model PKIMM
The PKI Consortium publishes initial draft of the PKI maturity model with
related resources to help the industry build mature and future proof PKI
including guidelines on how to evaluate the assessment and provide reporting to
relying parties. The PKI maturity model is recognized as a standard for
evaluation, planning, and comparison between different PKI implementations. In
this blog post we are going to introduce the model.

More on the PKI Consortium blog
We thank our sponsors for their ongoing support of the PKI Consortium

Previous

REGULATORY COMPLIANCE 101: LAWS, REQUIREMENTS & BEST PRACTICES 

Every day, our personal data is gathered and stored on electronic devices. From
our sensitive financial information to our health records, everything gets
stored on these devices. This makes the security of these devices an imperative
step and that’s where regulatory compliance plays an instrumental role in
ensuring that organizations from around the world are […] Published on Saturday
August 3, 2024 at www.encryptionconsulting.com

FIREFOX’S MOZILLA FOLLOWS GOOGLE IN DISTRUSTING ENTRUST’S TLS CERTIFICATES

Mozilla has announced it will officially stop trusting Entrust as a root
certificate authority (CA) starting November 30, 2024, due to a prolonged period
of compliance failures. This decision follows a similar move by Google Chrome,
which cut ties with Entrust a month earlier, citing a pattern of concerning
behaviors.  Google’s Initial Decision  In June […] Published on Friday August 2,
2024 at www.encryptionconsulting.com

STATE OF QUANTUM READINESS 2024

State of Quantum Readiness 2024 – Accutive Security + Keyfactor Keyfactor and
Accutive Security dive into the key challenges obstructing progress on Post
Quantum Readiness in 2024. Accutive Security and Keyfactor delve into the state
of Post-Quantum Readiness in 2024. This insightful report tackles challenges and
roadblocks to PQC readiness with clear tips for crypto […] The post State of
Quantum Readiness 2024 first appeared on Accutive Security. Published on Friday
August 2, 2024 at accutivesecurity.com

LESSONS FROM DIGICERT’S MASS CERTIFICATE REVOCATION

In recent cybersecurity news, DigiCert has made headlines with a significant
certificate revocation event affecting more than 83,000 certificates across
nearly 7,000 customers. This incident underscores the critical need for robust
certificate management practices and crypto-agility to swiftly address and
mitigate security vulnerabilities.   Understanding Certificate Revocation and
Its Impact The recent DigiCert incident has highlighted […] Published on Friday
August 2, 2024 at www.encryptionconsulting.com

HEADING TO BLACK HAT 2024 – PKI SPOTLIGHT GROWTH!

The post Heading to Black Hat 2024 – PKI Spotlight Growth! appeared first on PKI
Solutions. Published on Thursday August 1, 2024 at www.pkisolutions.com

PKI INSIGHTS RECAP – PAST, PRESENT, AND FUTURE OF PKI WITH BRIAN KOMAR

The post PKI Insights Recap – Past, Present, and Future of PKI with Brian Komar
appeared first on PKI Solutions. Published on Thursday August 1, 2024 at
www.pkisolutions.com

INTRODUCTION TO CERTSECURE MANAGER: ENCRYPTION CONSULTING’S FLAGSHIP CERTIFICATE
MANAGEMENT SOLUTION

Certificates have become a key component in today’s cyberspace where each
component requires a certificate to confirm its identity. From users to servers
to applications, every part of the organization requires a certificate to
function as intended. While this enhances the Organization’s overall security,
as the organization grows it becomes difficult to manage such certificates […]
Published on Thursday August 1, 2024 at www.encryptionconsulting.com

APAC’S DIGITAL TRUST REGULATORY LANDSCAPE | ASCERTIA | BLOG

The Asia Pacific (APAC) region is experiencing a digital boom, fuelled by a
rapidly growing online population and a surge in eCommerce. The region’s digital
transformation hinges on trust – trust that online transactions are secure, data
is protected and identities are verified. Published on Wednesday July 31, 2024
at blog.ascertia.com

MEETING CODE SIGNING COMPLIANCE AND ENHANCING SECURITY WITH CODE SIGNING
SOLUTION

Securing software is extremely important in the interconnected world in which
our industries operate. Every organization today needs to protect each and every
piece of software inside their organization from rising digital threats and
increasing incidents of software tampering. This is where code signing comes
into play. Code signing is the process of attaching a […] Published on Tuesday
July 30, 2024 at www.encryptionconsulting.com

YOUR GUIDE TO DO A PKI HEALTH CHECK

PKI health check is a thorough review of your current Public Key Infrastructure
(PKI) to ensure it is working properly, securely, and efficiently. It helps in
discovering areas that need to be improved and vulnerabilities and
inefficiencies that may exist thereby making sure your PKI aligns with the
present-day security requirements and best practices. Key […] Published on
Thursday July 25, 2024 at www.encryptionconsulting.com

ORACLE DATA MASKING: ORACLE ENTERPRISE VS. ALTERNATIVES

Oracle Database Overview For decades, Oracle has been a leader in the database
management system space with a powerful suite of database tools. Oracle Database
is a robust and highly scalable relational database management system (RDBMS)
widely used for enterprise applications. It operates on a structured framework
where data is organized into tables, which are […] The post Oracle Data Masking:
Oracle Enterprise vs. Alternatives first appeared on Accutive Security.
Published on Wednesday July 24, 2024 at accutivesecurity.com

THE »HACKER MINDSET« MYTH: WHY CYBERSECURITY NEEDS A NEW HERO

The cybersecurity field has long been captivated by the concept of "thinking
like a hacker." Read More … Published on Wednesday July 24, 2024 at creaplus.com

SIGNINGHUB SUPPORTS SIGNATURE TABLETS FOR FACE-TO-FACE MEETINGS

Not so long ago, working from home was mandatory, travelling across borders was
almost unthinkable and meeting someone for coffee required careful consideration
of risk versus reward. Published on Tuesday July 23, 2024 at blog.ascertia.com

CASE STUDY: WHY MISA USES ASCERTIA TECHNOLOGY

MISA Vietnam Joint Stock Company is one of the leading providers of information
technology solutions. It has 30 years of experience developing platforms,
software and IT services. Published on Wednesday July 17, 2024 at
blog.ascertia.com

ENTERPRISE CRYPTOGRAPHIC SERVICES

Does this sound familiar? You are working at a company on a big project and are
just about ready to move to production but need to add the final touches. You
are told that you need TLS certificates for your load balancers, application
servers, and database servers, a secure place to bootstrap some secrets from,
[…] The post Enterprise Cryptographic Services appeared first on Garantir.
Published on Tuesday July 16, 2024 at garantir.io

DIGITAL SIGNATURE ADOPTION AND CHALLENGES IN ASIA | ASCERTIA | BLOG

In a recent #AscertiaOn episode, Larry Lee, a product specialist from Netrust,
provided insightful perspectives on the evolving landscape of digital signatures
in Asia. Published on Tuesday July 16, 2024 at blog.ascertia.com

API ACCESS CONTROL: OPTIMIZING YOUR API SECURITY

In the digital transformation era, APIs have become the glue that holds modern
tech stacks together. APIs are critical for enabling seamless communication and
data exchange between systems. However; the rise of API usage also presents
significant security challenges. Effective API access control is the foundation
element to protect sensitive data, ensure compliance, and maintain […] The post
API Access Control: Optimizing your API Security first appeared on Accutive
Security. Published on Monday July 15, 2024 at accutivesecurity.com

UNIFIED COMMUNICATION ADMINISTRATOR – ALTERNATIV CONTAINERIZATION EXPERT

Unified Communication Administrator alternativ Containerization expert
Responsibilities: – Develop and maintain comprehensive UC solutions including
VoIP, video conferencing, instant messaging, and presence and collaboration
tools. – Evaluate existing UC Infrastructure and propose enhancements or
upgrades to optimize performance and efficiency. – Lead the implementation of UC
projects from conception to completion, ensuring alignment with industry …
„Unified Communication Administrator – Alternativ Containerization expert“
weiterlesen Published on Friday July 12, 2024 at datawh.info

TRANSFORMATIONAL DIGITAL SIGNING FOR BUSINESSES | ASCERTIA | BLOG

Over the last decade, the world’s businesses have embraced digital technology,
relying less and less on traditional signing methods. Companies worldwide are
adopting digital transformations to enhance efficiency, security and compliance.
Published on Monday July 8, 2024 at blog.ascertia.com

HOW TO IMPROVE SECURITY USING CENTRALIZED MULTI-FACTOR AUTHENTICATION (MFA)?

Data breaches are happening more frequently than ever before, making
organizations’ security defenses weaker and requiring continuous updates in
their strategic planning and security measures to keep the constantly advancing
threats at bay. In just 2023, there were an estimated 2,814 incidents of data
breaches, according to IT Governance. A study by the Harvard Business Review
shows that these incidents of […] Published on Thursday July 4, 2024 at
www.encryptionconsulting.com

DETAILED GUIDE TO MEETING NIST SP 1800-16 COMPLIANCE

NIST SP͏ 1800-16 has recently released their new ͏͏guidelines for managing TLS
certificates. The core emphasis has been put on preventing, detecting and
recovering from certificate-related incidents that are becoming increasing
commonly these days. These guidelines help organizations to navigate a secure
roadmap for implementing effective TLS certificate management programs to avoid
risks and maintain a […] Published on Wednesday July 3, 2024 at
www.encryptionconsulting.com

HOW TO AUTOMATE F5 CERTIFICATE MANAGEMENT

Whether you’re running a small business website, a complex enterprise
application, or a cloud-based service, your users expect seamless, uninterrupted
access. This is where load balancers come into play, and among the most trusted
names in this domain is F5 Networks. But manual certificate management on an F5
device can be pretty hectic considering the […] Published on Wednesday July 3,
2024 at www.encryptionconsulting.com

THE HIDDEN RISKS OF EXPIRED CERTIFICATE REVOCATION LISTS (CRL)

Digital certificates play a crucial role in web security and public key
infrastructure, ensuring secure internet communication. These certificates act
like digital identifications that verify a website’s legitimacy. Now, consider a
scenario where you try to access a website, but unknown to you, the certificate
validating this site has been compromised. This oversight opens a […] Published
on Tuesday July 2, 2024 at www.encryptionconsulting.com

WHAT IS YOUR ONBOARDING PROCESS TELLING YOUR CUSTOMERS?

What is Your Onboarding Process Telling Your Customers? HID + Accutive
Security’s Guide to Modernized Identity Verification for Financial Institutions
Download PDF Read on Website The post What is Your Onboarding Process Telling
Your Customers? first appeared on Accutive Security. Published on Wednesday June
26, 2024 at accutivesecurity.com

BUSINESS APPLICATION INTEGRATIONS: SIMPLIFY YOUR WORKFLOWS

Imagine a workplace where people navigate tasks effortlessly, context and
application switching ceases, data transfers become invisible, and productivity
flows. Published on Tuesday June 25, 2024 at blog.ascertia.com

Next
Participate in our community discussions and/or join the consortium
Improve this page

Become a member | Bylaws | Code of Conduct | IPR Agreement | List of members |
News from our members | Working groups
Decisions within the PKI Consortium are taken by substantial consensus of the
members as specified in our bylaws. Substantial consensus among members does not
necessarily mean that all members share the same view or opinion.

© 2024 PKI Consortium, Inc. All Rights Reserved