Unauthorized access, unsigned applications (malware) and unsecured email. What can help prevent these top 3 cyberthreats impacting organizations today? Public key infrastructure (PKI). Mark explains PKI and authentication in an article in ISACA’s The Nexus. I like his analogy describing PKI as “a virtual, encrypted handshake.” Check out the article.

Read More

I just got news that I have been invited to speak at the 2015 RSA Conference in San Francisco, California as a Peer 2 Peer facilitator. The topic of the session is “Cloud Based Security and Identities: Brilliance or Madness?”. Session P2P-W02D on April 22, 9:10am. The Peer 2 Peer format is an interactive discussion…

Read More

My three sessions from the recent TechMentor conference (part of 360! Live) in Orlando Florida are now available online. They are in my presentation archive here: https://www.pkisolutions.com/presentations/. The session topics were: Top 20 PKI Deployment Mistakes Securing Cloud Servers and Services with PKI Certificates Managing and Deploying BYOD Identity Solutions with a Microsoft PKI

Read More

Today I had the pleasure of speaking at the Microsoft TechEd Europe 2014 conference in Barcelona Spain. It was an event I have been looking forward to and judging from the pre-registrations to my sessions, it was going to be a good audience. Indeed it was – over 500 registrations for the sessions and the…

Read More

As I head back from the 1st annual Thales HSM User Group (HUG) conference in Chicago, I have been reflecting on the sessions and information that was shared at the conference. There is a ground swell of awareness around information protection and identity assurance. What was once the theoretical concepts of corporate espionage and dark…

Read More