The PKI Guy Blog

Certificate Requirements for Apple iOS 13 & macOS 10.15

By Jake Grandlienard | Jul 25, 2019

When the next iOS and macOS major update arrives this fall to iPhones, iPads and Macs there will be changes that impact environments with TLS certificates not current with standards. Certificates with key lengths shorter than 2048, those signed with a SHA1 algorithm, and certificates without the DNS name in the subject alternative name (SAN)…

Read More

Putting an End to Robocalls: FCC’s Robocall Summit Discusses Next Steps

By ThePKIGuy | Jul 11, 2019

Today, the Federal Communications Commission (FCC) held the SHAKEN/STIR Robocall Summit, led by Chairman Ajit Pai. The focus for the summit was to discuss the current state of efforts to stop robocalls and Caller ID spoofing and discuss the U.S. implementation of a new global standard called SHAKEN/STIR. Defined by the Alliance for Telecommunications Industry…

Read More

New Online PKI Training Courses Are a Deep Dive into Public Key Infrastructure: Critical for IT Security, IoT, 5G, and SHAKEN/STIR

By ThePKIGuy | May 2, 2019

Why Public Key Infrastructure (PKI)? A PKI is the core of IT for enterprises, supporting network authentication, data encryption, code signing and secure email. In addition, in the next two years, 42 percent of Internet of Things (IoT) devices such as temperature sensors, televisions, and smart vehicles will rely primarily on digital certificates for identification…

Read More

Certutil Bug in Windows Server 2016 Fails to Enumerate Issuance, Application Policies and OIDs

By ThePKIGuy | Apr 2, 2019

Recently one of our colleagues at nCipher in England related to us an issue reported by one of its customers using the certutil -verify -urlfetch command against an issued end-entity certificate on Windows Server 2016 (Build 1607). Running the command with no extra options, the command indicates a failure in the output (see figure below).…

Read More

PKI Glossary of Terms

By ThePKIGuy | Apr 1, 2019

Over the course of Public Key Infrastructure (PKI) design, implementation, and management, you will encounter many terms and acronyms that are defined in this document. The biggest part of the PKI implementation process is meeting with the stakeholders to ask and answer questions about where things are, how they work, what they struggle with today,…

Read More

Find @ThePKIGuy at RSA Conference 2019

By Kelly Stremel | Mar 1, 2019

We thought we would have a little fun at RSA this year, with a bit of sleuthing and a cool giveaway courtesy of The PKI Guy! Maybe you need a deep-dive into Public Key Infrastructure (PKI) and Active Directory Certificate Services (ADCS) to take your PKI skills to the next level? PKI Solutions will soon…

Read More

Object Identifiers (OID) in PKI

By Jake Grandlienard | Jan 8, 2019

A common question asked in our classes when we cover object identifiers (OIDs) is if there is a list of all the OIDs in a PKI environment. An object identifier is a string of decimal numbers that uniquely identifies an object. Since it isn’t a quick answer, I created this post to go a little…

Read More

7 Top Cybersecurity Trends in 2019

By ThePKIGuy | Dec 11, 2018

Forty-three percent of businesses were a victim of a cybersecurity breach in the past year, based on the recent Cyber Security Breaches Survey 2018. Organizations are continuing to do a less than stellar job protecting their users’ data from inadvertent exposure, such as exposed APIs, poor authentication, etc. In fact, 4.5 billion data records were…

Read More

What Types of Threats and Encryption Will We See in 2019?

By Kelly Stremel | Nov 26, 2018

What were the biggest cybersecurity concerns of 2018? What will the biggest technology trends be in 2019? Mark is interviewed about threats and encryption, taking a look at cybersecurity in 2018 and a look ahead to 2019. Check out the Q&A in Solutions Review.

Read More