Disclaimer: This review contains my personal opinion about the book and does not necessary reflect the company’s or other people opinion. Hello everyone, today I have a little-bit unusual blog post, which is a book review. As you may know, my primary interest area is Microsoft Active Directory Certificate Services (ADCS) and it there are…Read More
Q&A with J.J. Stapleton, co-author of Security without Obscurity: A Guide to PKI Operations
TPG: What practical advice do you have for an organization considering deploying a PKI solution?
JS: There are various PKI architectures to consider. An internal private PKI deployed wholly within the organization, a hosted private PKI deployed at a third-party service provider, or an external public PKI operated by a commercial third party. Each has pros and cons…Read More
For many years I’ve been tracking the corrections and issues in the last Microsoft Press Windows Server 2008 PKI book. All of these items have previously been incorporated into our standard deployment and consulting engagements as well as baked into our training courses. But I’ve long wanted to post an unofficial errata list for the…Read More
Unauthorized access, unsigned applications (malware) and unsecured email. What can help prevent these top 3 cyberthreats impacting organizations today? Public key infrastructure (PKI). Mark explains PKI and authentication in an article in ISACA’s The Nexus. I like his analogy describing PKI as “a virtual, encrypted handshake.” Check out the article.Read More
Book Recommendation A good friend of mine I met while at Microsoft just had one of his books released. Roger is a Security Columnist for InfoWorld and is a pretty dang sharp guy. His new book, Hacking the Hacker has some good information in many different areas confronting modern cybersecurity specialists. Of particular interest to…Read More