Blog
Our Latest Insights
Interviews, tips, guides, industry best practices, and news.

Application and Infrastructure Transformation for PQC: What Your Technology Estate Means for Readiness
Your PQC readiness journey depends on your technology estate. Learn what SaaS, IaaS and on-premise organisations need to consider for post-quantum transformation.
April 27, 2026

Why Post-Quantum Cryptography Is a Business Transformation, Not an Algorithm Swap
Post-quantum cryptography is not just a technical upgrade. Learn why PQC demands enterprise-wide transformation and how to approach it strategically.
April 20, 2026

PQC Support vs Performance: Why Vendor Claims Need Scrutiny
Many vendors claim PQC support, but how do their products perform under real-world conditions? Learn why the gap between marketing and operational performance matters.
April 13, 2026

Five Practical Steps to PQC Readiness That Don’t Require Major Investment
PQC readiness does not have to start with a large budget. Here are five practical steps organisations can take today to prepare for the post-quantum transition.
April 6, 2026

PQC and Legacy IT: How Architectural Wrappers Can Bridge the Gap
Not every system can be upgraded for PQC. Learn how architectural wrappers provide a practical, risk-managed approach to protecting legacy technology in the quantum era.
March 30, 2026

Building a Cryptographic Inventory: Where to Start and Why It Matters
You cannot manage what you cannot see. Learn why a cryptographic inventory is the essential first step in post-quantum readiness and how to build one practically.
March 23, 2026

What Does Crypto Agility Actually Mean in Practice?
Crypto agility is more than a vendor buzzword. Learn what it takes to build a genuinely agile cryptographic architecture and why it matters for PQC readiness.
March 16, 2026
.png)
What It’s Really Like Managing PKI Implementation & Migration Projects
Managing PKI implementation requires more than just technical skills. Learn how strong governance and stakeholder management drive successful PKI migrations.
March 9, 2026

Trust Now, Forge Later: The PQC Threat No One Is Talking About
While HNDL dominates the PQC conversation, Trust Now, Forge Later poses an even greater risk to digital signatures, firmware integrity and critical infrastructure.
March 9, 2026

Harvest Now, Decrypt Later: What CISOs Need to Know
Adversaries are already collecting encrypted data for future quantum decryption. Learn what Harvest Now, Decrypt Later means for your organisation and how to assess your exposure.
March 2, 2026

Lessons from Previous Hype Cycles: Why PQC Must Not Repeat the Mistakes of Cloud and Big Data
Post-quantum cryptography risks repeating the costly mistakes of cloud and big data migrations. Learn why PQC demands a business-led strategy, not just new technology.
February 23, 2026

Unsung and Cryptomathic Announce Partnership to Deliver Enterprise Key Management Solutions
Unsung announces a strategic partnership with Cryptomathic, combining CrystalKey 360 enterprise key management with specialist PKI consultancy and delivery.
February 20, 2026

Unsung and Krestfield Announce Strategic Partnership to Deliver Certificate Lifecycle Management Solutions
Strategic partnership between Unsung and Krestfield to deliver Certdog certificate lifecycle automation for Microsoft AD CS and hybrid PKI environments.
February 5, 2026

Post-Quantum Cryptography: Preparing Your PKI for Quantum Computing
Understand post-quantum cryptography and how to prepare your PKI for quantum computing. Balanced guidance from Unsung's cryptography specialists.
February 5, 2026
.png)
Reduction of Public TLS Certificate Lifetimes
The CA/Browser Forum approved Ballot SC 081v3, introducing a staged reduction in the maximum permitted lifetime of publicly trusted TLS certificates. This article outlines the reduction schedule, the rationale behind the changes, the scope of enforcement, and considerations for private PKI environments.
February 3, 2026

What is Symmetric Encryption? AES and Modern Data Protection
Understand symmetric encryption, AES, and authenticated encryption modes. Expert cryptography guidance from Unsung's PKI and security specialists.
February 3, 2026

Certificate Management Protocols: CMP, ACME, EST and SCEP Compared | Unsung
Technical comparison of certificate management protocols. When to use CMP, ACME, EST, or SCEP for enterprise PKI, DevOps, IoT, and network device enrolment
February 2, 2026

CBOM Explained: Why You Need a Cryptographic Bill of Materials
A Cryptographic Bill of Materials (CBOM) inventories every cryptographic asset in your organisation. Learn why CBOMs are essential for PQC readiness and how to build one.
January 30, 2026

Understanding Digital Certificates: SSL, TLS and X.509 Explained | Unsung
Learn what digital certificates are, how they work, and why certificate lifecycle management matters. Expert guidance from Unsung's PKI consultants.
January 26, 2026

What is Encryption? A Complete Guide for Organisations
Understand what encryption is, how it protects your data, and why proper key management matters. Expert guidance from Unsung's PKI and cryptography specialists.
January 19, 2026
.png)
G7 Cyber Expert Group Sets 2035 Target for Post-Quantum Cryptography Transition in Financial Services
The G7 Cyber Expert Group has released a coordinated roadmap for post-quantum cryptography transition in financial services, with a 2035 migration target.
January 14, 2026

Unsung and Crypto4A Announce Strategic Partnership to Deliver Quantum-Safe Cryptographic Infrastructure
Unsung and Crypto4A have formed a strategic partnership to deliver quantum-safe cryptographic infrastructure, combining Unsung's PKI expertise with Crypto4A’s post-quantum technology to future-proof cybersecurity systems against quantum-era threats.
January 13, 2026

Understanding Encryption Keys: The Foundation of Digital Security
Learn what makes encryption keys secure, how to manage them properly, and why key management is the critical vulnerability in most systems. Expert guidance from Unsung.
January 5, 2026

How to Evaluate CLM Vendors and Licensing Models
Compare CLM vendors including Keyfactor, Venafi, DigiCert, Sectigo, Entrust, and Certdog. Detailed product capabilities, licensing models, and pricing benchmarks for 2026.
December 8, 2025

Overcoming Resistance to Automation in Certificate Management
Learn how to overcome resistance to CLM automation and align certificate management with business outcomes.
December 7, 2025

Inside an Enterprise CLM Deployment: Key Features to Look For
Use this checklist to evaluate enterprise CLM solutions that ensure security, scalability, and compliance.
December 6, 2025

Applicability, Visibility, Availability, and Automation: The Four Pillars of CLM
Explore the four pillars of effective certificate lifecycle management—governance, automation, visibility, and integration.
December 5, 2025

The Real Cost of Expired Certificates (and How CLM Prevents It)
Discover the business risks and financial impact of expired certificates—and how proactive PKI can prevent them.
December 4, 2025

Keyfactor Command 25.4: Elevating Certificate Lifecycle Management with Unified Intelligence
Explore what's new in Keyfactor Command 25.4, including EJBCA integration, enhanced risk visibility and custom dashboards. Discover how Unsung supports clients with expert PKI design, implementation and managed services.
December 3, 2025

Why Traditional Certificate Management Is No Longer Enough
Find out why legacy certificate management fails today’s needs and how automation reduces security risk and outages.
December 3, 2025

The Role of PKI in Zero-Trust Security Strategies
Explore PKI’s role in Zero Trust security frameworks—enabling strong identity, access control, and encrypted communications.
December 2, 2025

Digital Identity in Government: Lessons from Estonia, Spain, and Beyond
Learn how governments use PKI to protect digital identities, ensure data integrity, and deliver trusted public services.
December 1, 2025

From Cockpits to Shopping Carts: PKI in Aviation and E-commerce
Discover how PKI secures aviation systems and e-commerce transactions through encryption and strong authentication.
November 30, 2025

Everyday Examples of PKI in Action
See how PKI secures daily digital interactions, from online banking to smart devices, ensuring trust and compliance.
November 29, 2025

PKI 101: The Foundation Behind Digital Certificates
Learn the essentials of PKI and digital certificates – the foundation of secure digital communication and identity trust.
November 28, 2025

Quantum-Safe PKI for Transport: Preparing Critical Infrastructure for Cryptographic Transition
Quantum computing will eventually break today’s widely used encryption. This article explains why UK transport operators must begin planning for quantum-safe Public Key Infrastructure (PKI) and Certificate Lifecycle Management (CLM) to protect rail, highways, aviation, and public transport systems.
November 27, 2025

PKI Maturity in Transport: A Practical Guide to Advancing CLM Capabilities
As digital transport networks expand, UK operators need stronger PKI and Certificate Lifecycle Management (CLM) maturity. This article explains the five stages of PKI maturity and how transport organisations can move from manual certificate tracking to automation and crypto-agile trust.
November 26, 2025

PKI in UK Transport: Why Digital Trust Now Determines Service Reliability
The UK transport sector is entering a new era of digital connectivity, making Public Key Infrastructure (PKI) essential for service reliability, cybersecurity, and passenger confidence. Learn why PKI and Certificate Lifecycle Management are now critical to rail, highways, aviation, and public transport.
November 25, 2025

PKI for Intelligent Transport Systems: Securing V2X and Smart Motorway Communication
Connected and intelligent transport systems depend on trusted machine-to-machine communication. This article explains how Public Key Infrastructure (PKI) and Certificate Lifecycle Management (CLM) protect V2X, smart motorways, and roadside infrastructure across the UK transport network.
November 24, 2025

CLM for Multi-Vendor Transport Supply Chains: Securing Third-Party Access and Device Trust
Transport organisations rely on complex supplier ecosystems, outsourced operations, and technology partners. This article explains how Certificate Lifecycle Management (CLM) strengthens trust, identity, and secure access across multi-vendor transport supply chains.
November 23, 2025

Certificate Outages in Critical Infrastructure: Preventing Transport Disruption with CLM
Expired or misconfigured digital certificates are a leading cause of service disruption in critical infrastructure. This article explains how Certificate Lifecycle Management (CLM) helps UK transport operators prevent outages, strengthen cybersecurity, and protect public confidence.
November 22, 2025

Certificate Lifecycle Automation for Rail Networks: Protecting ETCS and Control Systems
Modern rail networks depend on secure signalling and control systems. This article explains how automated Certificate Lifecycle Management (CLM) protects European Train Control System (ETCS) components, prevents outages, and strengthens digital trust across the UK rail sector.
November 21, 2025

Aviation PKI: Certificate Management for Airside Devices, Radar Systems, and Ground Operations
Airports and aviation networks rely on secure digital communication for airside access, radar systems, flight operations, and ground services. This article explains how Public Key Infrastructure (PKI) and Certificate Lifecycle Management (CLM) strengthen aviation cybersecurity and reduce disruption risks.
November 20, 2025

Too Many Tools, Too Little Time: Making Automation Work Across Silos
A deep dive into why certificate automation often fails at the organisational edges and how to overcome siloed tools, fragmented processes, and limited visibility. Learn practical steps to unify automation, reduce outages, and strengthen crypto-security across complex environments.
November 18, 2025

What is post quantum cryptography?
Quantum computers could break today’s cryptography and put sensitive data at risk. Learn about Harvest Now, Decrypt Later attacks, post-quantum cryptography, and how Unsung helps organisations prepare to be crypto-agile and quantum-ready
September 29, 2025

Navigating the NIST Post-Quantum Cryptography (PQC) Roadmap
NIST has set firm deadlines for phasing out RSA and ECC, with post-quantum cryptography becoming essential by 2030. Learn what the roadmap means, the risks of delay, and how Unsung helps organisations transition to a quantum-secure future.
September 16, 2025

Active Directory Certificate Services in Modern IT
Is ADCS holding your PKI back? Explore replacement options, migration paths, and real-world case studies. 20+ successful migrations delivered.
September 11, 2025

What is Certificate Lifecycle Management – CLM Series Part 1
Certificate Lifecycle Management (CLM) helps organisations avoid outages, breaches and compliance failures by automating discovery, renewal and policy enforcement. Learn why CLM is essential for security, resilience and operational efficiency.
September 1, 2025

What is PKI?
Discover how PKI (Public Key Infrastructure) underpins digital trust by securing identities, encrypting data and ensuring safe online transactions. Learn how Unsung’s PKI solutions help protect systems against evolving cyber threats.
August 7, 2025

The importance of digital trust
Digital trust is vital to protecting data, building customer confidence and winning business. Learn why it matters, how it reduces cyber risks, and how Unsung helps organisations establish digital trust with tailored PKI solutions.
May 22, 2025




