News from the PKI Consortium Members

An aggregated list of news published by our members

The Role of Preventive Maintenance in Data Center Operations

At DāSTOR we prioritize delivering enterprise-class data center solutions designed for resilience, operational …

Published on Friday August 8, 2025 at dastorllc.com
Essential CMMC Audit Checklist: Steps to Pass Your First Audit

If your organization handles Controlled Unclassified Information (CUI) for the U.S. Department of Defense (DoD), you can …

Published on Friday August 8, 2025 at massdata.com
A new era for security data management – Introducing Microsoft Sentinel Data Lake

Microsoft has taken a bold step forward with the public preview of Microsoft Sentinel Data Lake, a new way to process …

Published on Friday August 8, 2025 at www.capgemini.com
The digital battery passport puts the automotive industry to the test 

In the face of mounting challenges, the automotive industry is discovering new avenues for innovation. As manufacturers …

Published on Friday August 8, 2025 at www.capgemini.com
What is Data Masking? Techniques, Types, and Best Practices

Data Masking Techniques, Types of Masking and Best Practices As data becomes increasingly important for organizations, …

Published on Friday August 8, 2025 at accutivesecurity.com
Tanda Tangan Digital Peruri: Legal, Aman, dan Diakui Pemerintah!

Di era digital yang serba cepat ini, kebutuhan untuk menandatangani dokumen secara praktis dan aman menjadi hal yang tak …

Published on Friday August 8, 2025 at ezsign.id
FedRAMP, FISMA, and CMMC: Which One Applies to You?

Cybersecurity isn’t just a buzzword in the world of government contracting—it’s a requirement. Whether you’re a cloud …

Published on Friday August 8, 2025 at massdata.com
Announcing public preview: Phishing triage agent in Microsoft Defender

The Phishing Triage Agent in Microsoft Defender is now available in Public Preview. It tackles one of the most …

Published on Thursday August 7, 2025 at techcommunity.microsoft.com
How to Prepare for a NIST 800-171 Audit

Introduction If your organization handles Controlled Unclassified Information (CUI) for the Department of Defense (DoD) …

Published on Thursday August 7, 2025 at massdata.com
Agent vs. Agentless: Choosing Your Certificate Lifecycle Management Deployment 

Effective Certificate Lifecycle Management (CLM) is crucial for modern digital security. When implementing a CLM …

Published on Thursday August 7, 2025 at www.encryptionconsulting.com
A Crypto Extinction Event: Why IBM’s 2028 Quantum Timeline Changes Everything

IBM just published their fault-tolerant quantum computing roadmap, and it should terrify every cryptocurrency holder on …

Published on Thursday August 7, 2025 at blogs.groupware.org.uk
The Hidden Cost of AI: Is Your Data Leaking?

New research shows that sensitive corporate data is being unknowingly exposed through generative AI tools like ChatGPT …

Published on Thursday August 7, 2025 at creaplus.com
CMMC 2.0 Could Cost You Contracts — Here’s How to Stay Compliant

Under CMMC 2.0, compliance is no longer just a checkbox. It’s a contract requirement. If you fail to meet the standards …

Published on Thursday August 7, 2025 at massdata.com
Enterprise Guide to PQC Migration 

Think about the major shifts we have seen over the years. Every few decades, a new wave of technology arrives and …

Published on Wednesday August 6, 2025 at www.encryptionconsulting.com
Sharing practical guidance: Launching Microsoft Secure Future Initiative (SFI) patterns and practices

We’re excited to launch SFI patterns and practices: a new library of actionable guidance designed to help organizations …

Published on Wednesday August 6, 2025 at www.microsoft.com
Zero Trust and Cryptography: Building Trust Without Borders

The Zero Trust principle, “assume nothing, validate everything”, emphasizes that every access request must be …

Published on Wednesday August 6, 2025 at garantir.io
NTDS replication warning with Event ID 1093 — Template Best Practices

The post NTDS replication warning with Event ID 1093 — Template Best Practices appeared first on PKI Solutions.

Published on Wednesday August 6, 2025 at www.pkisolutions.com
Quantum-Resistant Cryptography: Safeguarding Data in the Quantum Age

Quantum computing poses a new and serious threat to modern encryption. Powerful algorithms like Shor’s can factor large …

Published on Wednesday August 6, 2025 at garantir.io
CSNA 2.0 and the Post-Quantum Future of Encryption

Quantum computers pose a grave threat to today’s encryption. Powerful quantum devices could break many widely used …

Published on Wednesday August 6, 2025 at garantir.io
Quantum Readiness: The Next Frontier for the Channel

Jordan Smith/ Channel Insider / 6 August 2025 Read the full article from Channel Insider here. The quantum clock is …

Published on Wednesday August 6, 2025 at www.qusecure.com
25 Years of essendi it – From a Small Start to a Major Milestone

The post 25 Years of essendi it – From a Small Start to a Major Milestone appeared first on essendi it.

Published on Wednesday August 6, 2025 at www.essendi.de
Building digital trust and driving digital signature adoption across APAC

The Asia-Pacific (APAC) region is in the midst of a sweeping digital transformation. With rising internet penetration, …

Published on Wednesday August 6, 2025 at blog.ascertia.com
CRM Transformation: A strategic choice for leaders in Life Sciences

CRM Transformation: A strategic choice for leaders in Life Sciences The post CRM Transformation: A strategic choice for …

Published on Wednesday August 6, 2025 at www.capgemini.com
Factory settings: Human plus humanoid

With the convergence of AI, robotics, spatial computing, and digital twins, enterprises now face a profound shift: …

Published on Wednesday August 6, 2025 at www.capgemini.com
Webinar: PQC Code Signing in a CNSA 2.0 World

CNSA 2.0 compliance deadlines are fast approaching, and the consequences of falling behind are significant. The post …

Published on Tuesday August 5, 2025 at garantir.io
Participate in our community discussions and/or join the consortium