Technical Blog

IoT Security Concerns in the World of Healthcare Devices

Posted by CSS Technical Team on Apr 26, 2016 11:25:11 AM

Healthcare Devices: Then and Now

Healthcare devices through the ages: what was once a cumbersome trip to the doctor for testing, followed by a series of manual documentation steps, is now a convenient, internet-connected wearable device that automates the transmission of patient information. Implanted devices are only one of many different wearable devices out on the market today. The majority of wearable healthcare devices connect to an internet or cloud-based system that allows users to interact with those devices while transmitting information to be used for actionable medical insight.

Read More

Topics: Internet of Things (IoT), IoT Healthcare, Healthcare, Wearables Security

Establishing A Private OID

Posted by John Redding on Apr 15, 2016 10:51:18 AM

As a Public Key Infrastructure (PKI) best practice, Certificate Policies are associated with a PKI by reserving and incorporating unique object identifiers (OID) into all or portions of your PKI.  OIDs are used to assign one or more Certificate Policies to a given CA.

Read More

Topics: PKI, Public Key Infrastructure (PKI), PKI OID, PKI Object Identifiers

Safely Adding SAN Information to a Certificate Request

Posted by Wayne Harris on Apr 6, 2016 9:46:39 AM

This blog is a continuation in a series of blogs, relating to the perils of adding Subject Alternate Name (SAN) information to a certificate signing request (CSR).

Read More

Topics: certificate management, Certificate SAN

Why is IoT Security So Critical?

Posted by CSS Technical Team on Mar 18, 2016 11:12:22 AM
IoT Security: the area of the information security industry aimed at securing devices, data, people and applications within the Internet of things (IoT).


What makes IoT Security so important? The growth of internet-connected data, devices, applications and users has exploded exponentially. IoT is carrying over into such a wide array of products and services: mobile devices, wearables, medical devices; everything under the sun can now be connected to the internet.

Read More

Topics: Internet of Things (IoT), IoT Security, PKI for IoT

Giving the Internet an Identity: How to Manage Digital Identities

Posted by CSS Technical Team on Feb 19, 2016 12:11:59 PM

 

If your organization is managing a significant volume of digital certificates (over 100), and expects continued rapid growth, your security team should consider an automated certificate lifecycle management solution.

When facing the responsibility to ensure the health, validity, and expiration dates of a large number of digital certificates, using an Excel spreadsheet is not a scalable or smart option. Letting just one certificate expire can be catastrophic. Having access to a solution that catalogs and monitors each certificate, alerts your team of expirations or issues, and assists in automating the re-issuance of revocation of certificates for the given data, device or application adds a layer of assurance to your security posture as well as satisfies an audit/compliance requirement.

Read More

Topics: digital certificates, Digital Identity Management, PKI for IoT

MIM Workflow Activity Library (MIMWAL)

Posted by Sami Van Vliet on Feb 5, 2016 2:36:48 PM

Building custom activities in Forefront Identity Manager (now Microsoft Identity Manager) required an understanding of programming in C# or VB.Net and how Windows Workflow Foundation functions.

Read More

Topics: MIM

2016 Public Key Infrastructure (PKI) and Internet of Things (IoT) Security Predictions

Posted by CSS Technical Team on Jan 21, 2016 10:59:45 AM

In 2016, the need for trusted digital identities will become paramount to the overall security within the global Internet.  As businesses continue to brace against cyber-adversaries and look to secure the Internet of Things (IoT), Public Key Infrastructure (PKI) is making a resurgence as an economical, reliable, and proven technology that delivers a secure and high-performance solution.

Read More

Topics: PKI, Internet of Things (IoT), IoT Security

Hidden Dangers: Certificate Subject Alternative Names (SANs)

Posted by Wayne Harris on Jan 7, 2016 2:47:31 PM

Few companies have the luxury of a dedicated full time professional PKI staff. More typical are those companies that assign this duty as an adjunct to someone with a separate primary function, such as AD engineering.  As such, I find that many PKI practitioners don’t have PKI proficiency as a primary skillset.  It’s easy to understand how a “just make it work” mentality can eventually creep into a PKI operational processes. Too often, operational efficiency easily trumps perceived security risks.

Read More

Topics: certificate, PKI, Certificate SAN

Broken Trust: Symantec's Untrusted Verisign Root CA

Posted by Michael F. Starke on Dec 18, 2015 4:32:22 PM

Left in the Dark: When the Sun Sets Too Early

The Internet security landscape is constantly changing.  Data drives the decisions that organizations make about their security posture; when that data is incomplete, forecasting the consequences of security changes becomes nearly impossible.  Earlier this month, at the prompting of Symantec Corporation, Google has removed trust for a legacy Verisign CA root certificate from their products including the Android mobile operating system and Chrome web browser.

Read More

Topics: SSL certificate, certificate research, root CA

Ripple Effects of ECC Key Patent Trolling

Posted by Michael F. Starke on Dec 7, 2015 4:59:00 PM

Digital identity authentication and data encryption are expanding exponentially with our growing reliance on the Internet of Things (IoT). Companies are looking to technology to minimize risk, protect assets, and reduce operational expense by safeguarding access to information and systems.  In the past, user names and passwords used to be the gold standard but as we learn more about security in a hyper-connected world, alternate methods relying on Public Key Cryptography have become very popular. As if it’s not complicated enough to identify and implement the right blend of security technology for a specific use case, along comes CryptoPeak Solutions LLC to throw a monkey wrench into the works.

Read More

Topics: Internet of Things (IoT), ECC key patent trolling, digital certificate security

Posts by Topic

see all

Want to Learn more about CSS?