Skip to content


PKI Explained: Why It Is Necessary and Relevant Now More Than Ever

Unauthorized access, unsigned applications (malware) and unsecured email. What can help prevent these top 3 cyberthreats impacting organizations today? Public key infrastructure (PKI). Mark explains PKI and authentication in an article in ISACA’s The Nexus. I like his analogy describing PKI as “a virtual, encrypted handshake.” Check out the article.

Read More

Speaking at the 2015 RSA Conference in San Francisco, CA

I just got news that I have been invited to speak at the 2015 RSA Conference in San Francisco, California as a Peer 2 Peer facilitator. The topic of the session is “Cloud Based Security and Identities: Brilliance or Madness?”. Session P2P-W02D on April 22, 9:10am. The Peer 2 Peer format is an interactive discussion…

Read More

TechMentor Orlando 2014 Presentations Now Available

My three sessions from the recent TechMentor conference (part of 360! Live) in Orlando Florida are now available online. They are in my presentation archive here: The session topics were:   Top 20 PKI Deployment Mistakes Securing Cloud Servers and Services with PKI Certificates Managing and Deploying BYOD Identity Solutions with a Microsoft PKI

Read More

Microsoft TechEd Europe – Top 10 PKI Deployment Mistakes

Today I had the pleasure of speaking at the Microsoft TechEd Europe 2014 conference in Barcelona Spain. It was an event I have been looking forward to and judging from the pre-registrations to my sessions, it was going to be a good audience. Indeed it was – over 500 registrations for the sessions and the…

Read More

HSMs and the changing PKI Ecosystem

As I head back from the 1st annual Thales HSM User Group (HUG) conference in Chicago, I have been reflecting on the sessions and information that was shared at the conference. There is a ground swell of awareness around information protection and identity assurance. What was once the theoretical concepts of corporate espionage and dark…

Read More
Scroll To Top