What an incredible, action-packed year 2019 turned out to be in cybersecurity. Throughout the past year, I interviewed industry experts, authors, and technology luminaries with topics ranging from quantum computing to authentication to top security threats to PKI evolution. Below are highlights from the 2019 The PKI Guy’s Q&A Series. Keep checking back to read…

Read More

Recently, the National Security Agency (NSA) published a guide to Managing Risk from Transport Layer Security Inspection. The guide is designed to highlight the unique risks introduced into environments by the use of TLS inspection appliances. It also covers a few recommendations on how to secure these devices. There are some additional areas we recommend…

Read More

Q&A with Ryan Smith, vice president, global business development, Futurex TPG: Tell us about your cryptographic solutions. RS: Futurex is a global manufacturer of FIPS 140-2 Level 3 and PCI HSM validated hardware security modules and enterprise security applications. At a high level, our focus is on three areas: cryptographic processing, key and certificate management,…

Read More

Unauthorized access, unsigned applications (malware) and unsecured email. What can help prevent these top 3 cyberthreats impacting organizations today? Public key infrastructure (PKI). Mark explains PKI and authentication in an article in ISACA’s The Nexus. I like his analogy describing PKI as “a virtual, encrypted handshake.” Check out the article.

Read More