Skip to content

The PKI Blog

7 Top Cybersecurity Trends in 2019

By ThePKIGuy | Dec 11, 2018

Forty-three percent of businesses were a victim of a cybersecurity breach in the past year, based on the recent Cyber Security Breaches Survey 2018. Organizations are continuing to do a less than stellar job protecting their users’ data from inadvertent exposure, such as exposed APIs, poor authentication, etc. In fact, 4.5 billion data records were…

Read More

What Types of Threats and Encryption Will We See in 2019?

By Kelly Stremel | Nov 26, 2018

What were the biggest cybersecurity concerns of 2018? What will the biggest technology trends be in 2019? Mark is interviewed about threats and encryption, taking a look at cybersecurity in 2018 and a look ahead to 2019. Check out the Q&A in Solutions Review.

Read More

The Evolving Sense of Trust in the Age of Cryptocurrency

By Kelly Stremel | Nov 6, 2018

With the rise of cryptocurrency, how we perceive the notion of trust is changing. Will cryptocurrency change our perception of trustworthy persons? Do we need to redefine and profile how we investigate and control personnel with digital currency? Mark’s premise is that we need trust to be the cornerstone before digital currency can gain wide…

Read More

How to Make Informed Risk Management Decisions About What to Store in the Cloud

By Kelly Stremel | Nov 6, 2018

There are risk management issues with the cloud. In his article, Mark discusses how organizations need to proceed with caution about what they store, outlines security risks, and makes recommendations. Check out his latest article in Security Magazine.

Read More

Mark Speaking at BSides PDX on October 27

By Kelly Stremel | Oct 15, 2018

Join Mark B. Cooper, president and founder of PKI Solutions, at this year’s BSides PDX, a gathering of the most interesting infosec minds in Portland and the Pacific Northwest. Mark will give a special presentation on “The Secret to Secrets Management” on Saturday, October 27, 2018 from 12:00 p.m. to 1:00 pm. In his presentation,…

Read More

Cloud Insecurity: The Need for Stronger Identity Management

By Kelly Stremel | Sep 10, 2018

With cloud usage growing exponentially, are we asking enough questions about cloud security for organizations to make informed risk management decisions? Mark addresses these issues, including should you entrust your private keys in the cloud? Check out his latest article in ISACA’s The Nexus.  

Read More

MS Press Server 2008 PKI Book Errata launch

By ThePKIGuy | Jul 16, 2018

For many years I’ve been tracking the corrections and issues in the last Microsoft Press Windows Server 2008 PKI book. All of these items have previously been incorporated into our standard deployment and consulting engagements as well as baked into our training courses. But I’ve long wanted to post an unofficial errata list for the…

Read More

Boost Security in Your Organization with Tactical Two-Factor Authentication

By Kelly Stremel | Jul 10, 2018

For business applications, two-factor authentication is a must, especially for any employee or user accounts that have access to sensitive applications or customer information. Mark explains how automating and integrating two-factor authentication technology is a vital step to guarding against security breaches. Check out his latest article in ISACA’s The Nexus.

Read More

PKI Explained: Why It Is Necessary and Relevant Now More Than Ever

By ThePKIGuy | May 16, 2018

Unauthorized access, unsigned applications (malware) and unsecured email. What can help prevent these top 3 cyberthreats impacting organizations today? Public key infrastructure (PKI). Mark explains PKI and authentication in an article in ISACA’s The Nexus. I like his analogy describing PKI as “a virtual, encrypted handshake.” Check out the article.

Read More
Scroll To Top