Newsroom

We are the experts in PKI consulting, training, and support

If you would like more information about PKI or other related industry topics such as encryption, identity management, or two-factor authentication—or to schedule an interview with Mark B. Cooper, please contact Kelly Stremel at McKenzie Worldwide.

You can also connect with Mark via Twitter at @ThePKIGuy.

In the News

July 17, 2019

Interview with KPTV 12 News

Popular FaceApp craze raises privacy concerns. Mark Cooper is interviewed about National Security, privacy concerns and growing risks of deep fakes.

May 21, 2019

Interview with KPTV 12 News

WiFi passwords hacked at local coffee shop, security compromised. Mark Cooper is interviewed about security and authentication protections for businesses.

March 27, 2019

12 Ways to Get a Handle on Secrets Management

The modern identity landscape is filled with secrets, yet organizations are challenged with storing, managing, and protecting them.

March 26, 2019

What is Wrong with IoT Security Today?

The list of Internet of Things (IoT) is growing quickly, and so are the security concerns. Currently, most IoT devices have poor security in place...

February 8, 2019

Correctly Deploying a PKI Solution

With new threats to data emerging, public key infrastructure (PKI) has become an increasingly larger part of enterprises’ information security and risk management strategies...

untitled-2
January 17, 2019

PKI Deployment: The 10 Definitive Answers

Public key infrastructure (PKI) is more important than ever, as organizations are doing a less-than-stellar job protecting their users’ data from inadvertent exposure...

dr-logo-3
December 17, 2018

Shhhhh! The Secret to Secrets Management

Companies need to take a centralized approach to protecting confidential data and assets. Here are 12 ways to get a handle on the problem. Organizations in all industries have secrets that need to be protected...

December 13, 2018

Cryptocurrency and the Need for Trust

For the first time in modern history, our civilization is on the verge of a new concept in monetary transactions with cryptocurrency. Cryptocurrency could be hugely disruptive to many industries and could...

Solution-Reviews-Logo-on-Red
November 26, 2018

Threats and Encryption in 2019, a Q&A

What data privacy concerns await enterprises in 2019? What encryption will enterprises need to employ? What threats will they face? To gain some valuable perspective on these questions, we spoke to Mark B. Cooper...

nexus
November 11, 2018

Digital Currency and the Need for Trust

For the first time in modern history, our civilization is on the verge of a new concept in monetary transactions with cryptocurrency. Cryptocurrency could be hugely disruptive to many industries...

untitled-2
November 5, 2018

The Evolving Sense of Trust in the Age of Cryptocurrency

Cryptocurrency could completely change the money transfer services industries, but we need trust to be at the cornerstone before it can gain wide acceptance and be legitimized. 

Security-Magazine-logo-2
November 1, 2018

How to Make Informed Risk Management Decisions about What to Store in the Cloud

With cyber threats evolving, cloud servers are a major target and more than 80 percent of organizations store their information in the public cloud...

nexus
September 10, 2018

Cloud Insecurity: The Need for Stronger Identity Management

With cloud usage growing exponentially, are we asking enough questions about cloud security for organizations to make informed risk management decisions?

nexus
July 9, 2018

Boost Security in Your Organization with Tactical Two-Factor Authentication

For business applications, two-factor authentication is a must and can provide significant security improvements beyond passwords.

nexus
May 14, 2018

PKI Explained: Why it is Necessary and Relevant Now More Than Ever

Unauthorized access, unsigned applications (malware) and unsecured email. What can help prevent these top 3 cyberthreats impacting organizations today?

April 11, 2018

Stay Safer Online with Two-Factor Identification

In a well-intentioned effort to help us stay safer online, most online sites and services that involve a login to protect sensitive or personal data and information are now encouraging...

BYOD-2
March 28, 2018

4 Questions on BYOD Culture with Mark Cooper of PKI Solutions

Bring-your-own-devices culture (BYOD) is sweeping enterprises around the world, bringing a flood of innovations and cybersecurity concerns.

Secure-IoT-mod-Mod-2
March 28, 2018

3 Questions on the Internet of Things (IOT) with Mark Cooper of PKI Solutions

The Internet of Things has proven a recurring security challenge in the modern workplace, as the devices typically lack any sort of security platform.

PBJ-Pinstripe-Google-cover-1024x576
Feb 12, 2018

Oregon Cybersecurity Experts Issue Predictions for 2018

Cybersecurity catastrophes like Equifax’s massive data breach, which exposed the personal information of more than 145 million people, may be behind us, but it’s clear...

Upcoming Speaking Engagements

Media Resources