The PKI Blog

PKI Explained: Why It Is Necessary and Relevant Now More Than Ever

By ThePKIGuy | May 16, 2018

Unauthorized access, unsigned applications (malware) and unsecured email. What can help prevent these top 3 cyberthreats impacting organizations today? Public key infrastructure (PKI). Mark explains PKI and authentication in an article in ISACA’s The Nexus. I like his analogy describing PKI as “a virtual, encrypted handshake.” Check out the article.

Read More

BYOD Raises Challenges Around Identity and Access Management

By Kelly Stremel | Apr 18, 2018

We work in a bring-your-own-devices (BYOD) culture, which raises questions and challenges around identity and access management. Mark was interviewed by Solutions Review about BYOD security issues and what organizations can do. Check out the Q&A.

Read More

What Can Organizations Do About IoT Security?

By Kelly Stremel | Apr 16, 2018

The Internet of Things (IoT) promises innovation and helpfulness, but it also raises cybersecurity challenges for organizations, as IoT devices typically lack any sort of security platform. Mark outlines security risks and offers up recommendations. Check out the Q&A he did with Solutions Review.  

Read More

Stay Safer Online With Two-Factor Authentication

By Kelly Stremel | Apr 12, 2018

According to Pew Research Center, 84 percent of adults rely primarily on memorization or pen and paper to store passwords. But we know that storing passwords on paper could lead to exposure. Instead, using a complex password, combined with password management, and two-factor or multi-factor authentication can help greatly reduce risks. Especially with phishing on…

Read More

Microsoft ADCS Certificate Transparency Support

By ThePKIGuy | Mar 26, 2018

Microsoft just released their official statement and support for Certificate Transparency. I will be writing a full article covering this update as there are several key areas that are lacking in the Microsoft documentation. So in the interest of spreading the word on the official announcement, here is the link: https://support.microsoft.com/en-us/help/4093260/introduction-of-ad-cs-certificate-transparency   Issues that need…

Read More

PKI Solutions is hiring talented PKI professionals

By ThePKIGuy | Mar 13, 2018

PKI Solutions offers a complete set of PKI consulting, training, professional services, support and assessments with a particular emphasis on Microsoft Active Directory Certificate Services. As the demand for cybersecurity and the increased protection offered by PKI technologies continues to grow in the enterprise and the Internet of Things, so too is PKI Solutions Inc.…

Read More

Understanding Microsoft Cryptographic Service Providers

By ThePKIGuy | Feb 28, 2018

A common question I often get from customers and students is about Microsoft’s Cryptographic Service Providers (CSP). The CSPs are responsible for creating, storing and accessing cryptographic keys – the underpinnings of any certificate and PKI. These keys can be symmetric or asymmetric, RSA, Elliptical Key or a host of others such as DES, 3DES, and…

Read More

PKI Solutions logo contest!

By ThePKIGuy | Feb 23, 2018

We’re pleased to announce that we’re unveiling our new company logo on our website today. The PKIGuy and the rest of the team here are excited to welcome you to our first-ever PKI Solutions logo contest! Since cryptography is the art of writing and solving codes, we decided to have some fun with the roll-out…

Read More

Backing up ADCS Certificate Authorities (Part 2 of 2)

By ThePKIGuy | Jan 11, 2018

In my last blog post (Backing up ADCS Certificate Authorities Part 1) I covered the inner workings of how ADCS and the Jet database works to maintain the CA data. In this post I am going to go over a comprehensive PowerShell script that I wrote to perform a full backup of all necessary ADCS…

Read More