Posts Tagged ‘cybersecurity’
The PKI Guy talks quantum computing with Roger A. Grimes
The PKI Guy discusses telecommunications with Dr. Charles Clancy of Virginia Tech
Q&A with Dr. Charles Clancy, executive director of Virginia Tech’s Hume Center for National Security and Technology, engineering professor, and author TPG: Tell us how you’re involved in cybersecurity for telecommunications. CC: I have been working at the intersection of cybersecurity and telecommunications for the past 20 years. When I was a PhD student, WiFi…
Read MoreNew Online PKI Training Courses Are a Deep Dive into Public Key Infrastructure: Critical for IT Security, IoT, 5G, and SHAKEN/STIR
Why Public Key Infrastructure (PKI)? A PKI is the core of IT for enterprises, supporting network authentication, data encryption, code signing and secure email. In addition, in the next two years, 42 percent of Internet of Things (IoT) devices such as temperature sensors, televisions, and smart vehicles will rely primarily on digital certificates for identification…
Read MoreThe PKI Guy talks enterprise security with Ryan Smith of Futurex
Q&A with Ryan Smith, vice president, global business development, Futurex TPG: Tell us about your cryptographic solutions. RS: Futurex is a global manufacturer of FIPS 140-2 Level 3 and PCI HSM validated hardware security modules and enterprise security applications. At a high level, our focus is on three areas: cryptographic processing, key and certificate management,…
Read MoreThe PKI Guy drills down on PKI operations with Jeff Stapleton, author
Q&A with J.J. Stapleton, co-author of Security without Obscurity: A Guide to PKI Operations
TPG: What practical advice do you have for an organization considering deploying a PKI solution?
JS: There are various PKI architectures to consider. An internal private PKI deployed wholly within the organization, a hosted private PKI deployed at a third-party service provider, or an external public PKI operated by a commercial third party. Each has pros and cons…
Read More