The PKI Guy Blog

The Evolving Sense of Trust in the Age of Cryptocurrency

By Kelly Stremel | Nov 6, 2018

With the rise of cryptocurrency, how we perceive the notion of trust is changing. Will cryptocurrency change our perception of trustworthy persons? Do we need to redefine and profile how we investigate and control personnel with digital currency? Mark’s premise is that we need trust to be the cornerstone before digital currency can gain wide…

Read More

How to Make Informed Risk Management Decisions About What to Store in the Cloud

By Kelly Stremel | Nov 6, 2018

There are risk management issues with the cloud. In his article, Mark discusses how organizations need to proceed with caution about what they store, outlines security risks, and makes recommendations. Check out his latest article in Security Magazine.

Read More

Mark Speaking at BSides PDX on October 27

By Kelly Stremel | Oct 15, 2018

Join Mark B. Cooper, president and founder of PKI Solutions, at this year’s BSides PDX, a gathering of the most interesting infosec minds in Portland and the Pacific Northwest. Mark will give a special presentation on “The Secret to Secrets Management” on Saturday, October 27, 2018 from 12:00 p.m. to 1:00 pm. In his presentation,…

Read More

Cloud Insecurity: The Need for Stronger Identity Management

By Kelly Stremel | Sep 10, 2018

With cloud usage growing exponentially, are we asking enough questions about cloud security for organizations to make informed risk management decisions? Mark addresses these issues, including should you entrust your private keys in the cloud? Check out his latest article in ISACA’s The Nexus.  

Read More

MS Press Server 2008 PKI Book Errata launch

By ThePKIGuy | Jul 16, 2018

For many years I’ve been tracking the corrections and issues in the last Microsoft Press Windows Server 2008 PKI book. All of these items have previously been incorporated into our standard deployment and consulting engagements as well as baked into our training courses. But I’ve long wanted to post an unofficial errata list for the…

Read More

Boost Security in Your Organization with Tactical Two-Factor Authentication

By Kelly Stremel | Jul 10, 2018

For business applications, two-factor authentication is a must, especially for any employee or user accounts that have access to sensitive applications or customer information. Mark explains how automating and integrating two-factor authentication technology is a vital step to guarding against security breaches. Check out his latest article in ISACA’s The Nexus.

Read More

PKI Explained: Why It Is Necessary and Relevant Now More Than Ever

By ThePKIGuy | May 16, 2018

Unauthorized access, unsigned applications (malware) and unsecured email. What can help prevent these top 3 cyberthreats impacting organizations today? Public key infrastructure (PKI). Mark explains PKI and authentication in an article in ISACA’s The Nexus. I like his analogy describing PKI as “a virtual, encrypted handshake.” Check out the article.

Read More

BYOD Raises Challenges Around Identity and Access Management

By Kelly Stremel | Apr 18, 2018

We work in a bring-your-own-devices (BYOD) culture, which raises questions and challenges around identity and access management. Mark was interviewed by Solutions Review about BYOD security issues and what organizations can do. Check out the Q&A.

Read More

What Can Organizations Do About IoT Security?

By Kelly Stremel | Apr 16, 2018

The Internet of Things (IoT) promises innovation and helpfulness, but it also raises cybersecurity challenges for organizations, as IoT devices typically lack any sort of security platform. Mark outlines security risks and offers up recommendations. Check out the Q&A he did with Solutions Review.  

Read More