Why Public Key Infrastructure (PKI)? A PKI is the core of IT for enterprises, supporting network authentication, data encryption, code signing and secure email. In addition, in the next two years, 42 percent of Internet of Things (IoT) devices such as temperature sensors, televisions, and smart vehicles will rely primarily on digital certificates for identification…

Read More

Q&A with Cindy Provin, CEO, nCipher Security TPG: There has been lots of news lately about your company being acquired by Entrust Datacard. What’s the latest with nCipher Security? CP: nCipher Security is a separate company within Thales. nCipher has been operating as a separate stand-alone business within Thales since January 2019.  We continue to…

Read More

Q&A with J.J. Stapleton, co-author of Security without Obscurity: A Guide to PKI Operations

TPG: What practical advice do you have for an organization considering deploying a PKI solution?

JS: There are various PKI architectures to consider. An internal private PKI deployed wholly within the organization, a hosted private PKI deployed at a third-party service provider, or an external public PKI operated by a commercial third party. Each has pros and cons…

Read More

Forty-three percent of businesses were a victim of a cybersecurity breach in the past year, based on the recent Cyber Security Breaches Survey 2018. Organizations are continuing to do a less than stellar job protecting their users’ data from inadvertent exposure, such as exposed APIs, poor authentication, etc. In fact, 4.5 billion data records were…

Read More

Q&A with Muralidharan Palanisamy, chief solutions officer, AppViewX TPG: Tell us a little bit about AppViewX. MP: AppViewX is revolutionizing the way NetOps and SecOps teams deliver services to Enterprise IT. We have a modular, low-code software platform that enables the automation and orchestration of network and security infrastructure using an intuitive, context-aware, visual workflow. TPG: What…

Read More