We thought we would have a little fun at RSA this year, with a bit of sleuthing and a cool giveaway courtesy of The PKI Guy! Maybe you need a deep-dive into Public Key Infrastructure (PKI) and Active Directory Certificate Services (ADCS) to take your PKI skills to the next level? PKI Solutions will soon…Read More
Q&A with J.J. Stapleton, co-author of Security without Obscurity: A Guide to PKI Operations
TPG: What practical advice do you have for an organization considering deploying a PKI solution?
JS: There are various PKI architectures to consider. An internal private PKI deployed wholly within the organization, a hosted private PKI deployed at a third-party service provider, or an external public PKI operated by a commercial third party. Each has pros and cons…Read More
A common question asked in our classes when we cover object identifiers (OIDs) is if there is a list of all the OIDs in a PKI environment. An object identifier is a string of decimal numbers that uniquely identifies an object. Since it isn’t a quick answer, I created this post to go a little…Read More
Forty-three percent of businesses were a victim of a cybersecurity breach in the past year, based on the recent Cyber Security Breaches Survey 2018. Organizations are continuing to do a less than stellar job protecting their users’ data from inadvertent exposure, such as exposed APIs, poor authentication, etc. In fact, 4.5 billion data records were…Read More
What were the biggest cybersecurity concerns of 2018? What will the biggest technology trends be in 2019? Mark is interviewed about threats and encryption, taking a look at cybersecurity in 2018 and a look ahead to 2019. Check out the Q&A in Solutions Review.Read More