Posts by Josh Sommer
Digital Trust and IT Security: Empowering Your Organization
Digital Trust and IT Security: Empowering Your Organization Finding a solution to Public Key Infrastructure (PKI) challenges is not always “one-size-fits all”. Tons of factors come into play, but one thing is certain: In today’s digital world, organizations of all sizes rely on PKI to ensure secure communication and protect critical business functions. PKI acts…
Read MoreSecuring Active Directory Certificate Services: Protecting Your Digital Assets
Active Directory Certificate Services (ADCS) plays a crucial role in securing digital assets within organizations. However, even a single device can introduce vulnerabilities in the PKI (Public Key Infrastructure) environment. Understanding, implementing, and securing ADCS can be challenging, requiring organizations to proactively address potential risks. In this blog post, we will explore the risks associated…
Read MoreCertified Pwned: PKI Spotlight® May 2023 Feature Release Webinar Highlights
Nick Sirikubult, Director Of Business Development, and Michael Bruno, PKI Software Engineer, showcased the latest features of PKI Spotlight® during our May 9th, 2023 Webinar. We will be adding the entire video along with Q&As to this page soon! PKI Solutions has announced the latest release of PKI Spotlight®, a Public Key Infrastructure monitoring and…
Read MoreHungry, Hungry Hippos: Addressing Vulnerabilities in MS Active Directory Certificate Services
The use of MS Active Directory Certificate Services (ADCS) is crucial for the secure operation of modern enterprises. However, it is vital to keep up with potential vulnerabilities that may arise within ADCS environments. This whitepaper highlights two critical vulnerabilities that affect ADCS environments and provides actionable steps to address them. Vulnerability 1: Man-in-the-Middle (MiTM)…
Read MoreProtecting Public Key Infrastructure (PKI) Environments and Certificate Authorities (CAs) Against Password Fatigue and Authentication Risks: A Guide for Cybersecurity Professionals Using PKI Spotlight
Abstract Public Key Infrastructure (PKI) and Certificate Authorities (CAs) play a crucial role in digital security, ensuring the authenticity and integrity of online communications. However, PKI and CA environments are vulnerable to various authentication risks, including password fatigue, which can compromise the security of an organization’s sensitive data. This guide provides insights into these risks…
Read More