Webinars
Certified Pwned: PKI Spotlight® May 2023 Feature Release Webinar Highlights
Nick Sirikubult, Director Of Business Development, and Michael Bruno, PKI Software Engineer, showcased the latest features of PKI Spotlight® during our May 9th, 2023 Webinar. We will be adding the entire video along with Q&As to this page soon! PKI Solutions has announced the latest release of PKI Spotlight®, a Public Key Infrastructure monitoring and…
Read MoreWebinar: Deadlines, Impact & Action: Certificate Based Authentication Changes (KB5014754)
Enjoy an hour of Pre-Recorded Live Q&A at our PKI Solutions “Office Hours.” – Deadlines Impact & Action: Certificate Based Authentication Changes (KB5014754) Play Video To address the threats from CVE-2022-34691, CVE-2022-26931 and CVE-2022-26923, Microsoft will enforce strong mappings between an authentication certificate and the account object with a new Object Identifier Extension (OID)…
Read MoreWhat’s New PKI Spotlight – Feb 2023 Release
Join Nick Sirikubult, Program Manager for PKI Spotlight, and Michael Bruno, PKI Software Engineer, as they showcase the latest features of PKI Spotlight during our Feb 7 Webinar. We will be adding the entire video along with Q&As to this page. Play Video Nick and Michael displayed the latest first-of-its-kind Best Practices Engine to keep…
Read MorePKI Threat Detection and Recon: Code Signing – “The Signed Back Door” Webinar
Below are the key highlights, Q&A from our PKI Solutions “Office Hours”: The PKI Threat Detection and Recon: Code Signing Episode While our focus was on default check boxes and PKI misconfigurations, which can give adversaries access to a code signing certificate or they can just create their own, we touched on may topics. Presenter…
Read MorePKI Threat Detection and Recon: Code Signing – “The Signed Back Door” & Voldemort
Join us for an hour of Live Q&A at our PKI Solutions “Office Hours.” – The PKI Threat Detection and Recon: Code Signing – “The Signed Back Door” & Voldemort Episode A default check box or a PKI misconfiguration can give adversaries access to a code signing certificate or they can just create their own.…
Read More