Q&A with J.J. Stapleton, co-author of Security without Obscurity: A Guide to PKI Operations
TPG: What practical advice do you have for an organization considering deploying a PKI solution?
JS: There are various PKI architectures to consider. An internal private PKI deployed wholly within the organization, a hosted private PKI deployed at a third-party service provider, or an external public PKI operated by a commercial third party. Each has pros and cons…Read More
The Internet of Things (IoT) promises innovation and helpfulness, but it also raises cybersecurity challenges for organizations, as IoT devices typically lack any sort of security platform. Mark outlines security risks and offers up recommendations. Check out the Q&A he did with Solutions Review.Read More