Q&A with J.J. Stapleton, co-author of Security without Obscurity: A Guide to PKI Operations
TPG: What practical advice do you have for an organization considering deploying a PKI solution?
JS: There are various PKI architectures to consider. An internal private PKI deployed wholly within the organization, a hosted private PKI deployed at a third-party service provider, or an external public PKI operated by a commercial third party. Each has pros and cons…Read More
Q&A with Kevin von Keyserling, CEO and co-founder, Keyfactor TPG: Tell us about Keyfactor. KvK: We’re a digital identity software company that provides end-to-end authentication, encryption, and signing technologies that safeguard data, devices, applications, and people. Our platform allows our clients to master every digital identity within their organization quickly, easily and cost-effectively. Up until a…Read More
With the rise of cryptocurrency, how we perceive the notion of trust is changing. Will cryptocurrency change our perception of trustworthy persons? Do we need to redefine and profile how we investigate and control personnel with digital currency? Mark’s premise is that we need trust to be the cornerstone before digital currency can gain wide…Read More
There are risk management issues with the cloud. In his article, Mark discusses how organizations need to proceed with caution about what they store, outlines security risks, and makes recommendations. Check out his latest article in Security Magazine.Read More
Q&A with Muralidharan Palanisamy, chief solutions officer, AppViewX TPG: Tell us a little bit about AppViewX. MP: AppViewX is revolutionizing the way NetOps and SecOps teams deliver services to Enterprise IT. We have a modular, low-code software platform that enables the automation and orchestration of network and security infrastructure using an intuitive, context-aware, visual workflow. TPG: What…Read More