PKI Blog

CSS Technical Team

CSS Technical Team

Recent Posts

The Real Cost of an Expired Digital Certificate

Posted by CSS Technical Team on Jun 22, 2017 1:03:04 PM

The average global 5,000 company spends about $15 million to recover from a certificate outage. These estimates are based on a Ponemon survey of about 2,400 global respondents which include remediation costs, loss of productivity, lost revenues, and brand image damage.

Read More

Topics: digital certificate, Public Key Infrastructure, PKI, Digital Identity Management, Unplanned Outages

Reflections on the 2017 Thales Data Threat Report

Posted by CSS Technical Team on Jun 2, 2017 1:40:54 PM
Trends in Encryption and Data Security Include Major Implications for the IoT

Key Trends of the 2017 Thales Data Threat Report

The Global Edition of the 2017 Thales Data Threat Report featured a number of trends in the data set which are noteworthy for enterprises invested in the IoT, as well as cloud security. The 2017 report is based on a survey of over 1,100 security executives across the globe, and emphasizes the security impacts of advanced technologies, including cloud, big data, IoT, and containers.

Read More

Topics: Thales e-Security, Encryption, IoT Security, Data Security

Layering Certificate-based Authentication Security onto ThingWorx IoT Platform

Posted by CSS Technical Team on May 19, 2017 1:59:29 PM

Congratulations, you’ve chosen ThingWorx to launch and manage your IoT devices, applications and data. Your goals are clear, your code has been tested and the connections are ready to engage. Unfortunately, you’ve forgotten a critical component that will sadly cause your entire project to fail.

Added layers of security, specifically unique device key authentication.

Read More

Topics: IoT, Internet of Things (IoT), PKI for IoT, Cyber Security, ThingWorx

Google Chrome Version 58: Short and Long Term Fixes

Posted by CSS Technical Team on May 5, 2017 2:02:23 PM

With Google’s recent Chrome 58 version update, your Public Key Infrastructure (PKI) may suddenly be impacted. Your formerly-compliant HTTPS certificates may no longer be working. CSS is here to explain what has changed, why has it changed and how to identify which certificates may be impacted. We will look at a temporary Google Chrome work around and view best practice security settings to adopt when working with SANs (Subject Alternative Name) certificates.

Read More

Topics: expired certs, Public Key Infrastructure (PKI), Google Chrome Version 58, CRL Monitoring, Certificate Provisioning, PKI for chrome

CSS to Attend RSA 2017, Featuring CMS Sapphire for PKI-as-a-Service (PKIaaS), CMS VerdeTTo IoT Directory Services, and CMS Topaz for Cloud Apps.

Posted by CSS Technical Team on Feb 9, 2017 3:06:59 PM

Planning on attending RSA 2017? Connect with CSS!

Are You Attending RSA 2017? Connect with the Cyber Security Experts at Certified Security Solutions

Certified Security Solutions (CSS) will be attending the 2017 RSA Conference in San Francisco this February. Our full team will be in attendance, and we’re looking forward to getting to know the information security professionals of the community and interfacing with attendees. We will also be featuring our latest solutions that include CMS Sapphire for PKI-as-a-Service, CMS VerdeTTo IoT Directory Services, and CMS Topaz for Cloud Apps and Application Developers.

Read More

Topics: RSA, PKI, IoT

Security Considerations of the Aerospace and Defense Industry

Posted by CSS Technical Team on Feb 3, 2017 10:25:33 AM

Cyber Threats to Aerospace and Defense


 Cyber Threat Conditions in Aerospace and Defense  

As one can imagine, the aerospace and defense industry is full of highly sensitive data. When you consider their primary customers, namely the federal government and federal space programs, it’s no surprise that the kind of information commonly transmitted is extremely classified by nature.

Read More

Topics: PKI, Cyber Security, Cyber Threats, Aerospace

Cyber Threats to Telecom

Posted by CSS Technical Team on Jan 26, 2017 7:17:12 PM

Evolving Challenges of Cyber Security in Telecommunications

The Telecom Threat Environment

For the telecommunications sector, staying up-to-speed with information security challenges is a constant battle. Telecom organizations are expanding their reach and transforming into full-blown technology companies. Such a complex ecosystem for business means that the industry is facing unending IT threats, and will continue to have the need to balance a variety of compliance requirements. In engaging with millions of customers subscribing to services ranging from cable, the Internet, home and mobile phone service, and even data centers, the industry is operating within a heavily risk-laden environment.

Read More

Topics: PKI, Cyber Security

The Threat Landscape of Manufacturing

Posted by CSS Technical Team on Jan 12, 2017 4:14:29 PM

Manufacturing is Contending with a Changing Risk Environment

An Overview of Cyber Threats to Manufacturing

Manufacturing is a widespread industry with a lot of components. Mass production, purchasing, selling, and the information and data management necessary to oversee it all largely make up the inner workings of the day-to-day in manufacturing. All manufacturers today are facing cybersecurity issues, including communication security, internet security, protecting customer information and managing sensitive information such as trade secrets and credit card or financial data through production and control systems. It’s a heavy burden to bear.

Read More

Topics: PKI, IoT, Cyber Security, manufacturing

CSS Research Survey: Digital Identity Insights

Posted by CSS Technical Team on Jan 5, 2017 4:01:19 PM

CSS Presents Cyber Security Survey Results

 
A National Digital Identity Insights Survey

In Q4 2016, CSS Research surveyed information security professionals on their current and anticipated public key infrastructure (PKI) usage, as well as PKI challenges and plans for 2017.

CSS Research surveyed 105 respondents who manage cyber security tools in an evolving digital authentication landscape nationally.

Read More

Topics: PKI, Cyber Security

Cybersecurity in Retail: Facing the Threats of Today

Posted by CSS Technical Team on Dec 16, 2016 1:41:13 PM

Facing the Cybersecurity Challenges of the Retail Sector

Retail’s Cyber Threat Environment: Debit Cards, Credit Cards, and Surviving as a Popular Target

The Internet, technological evolution, and the “always on, always connected” nature of humanity today certainly enables many convenient capabilities. We can order dinner with the swipe of a finger, reserve movie tickets instantaneously and purchase clothing within seconds. Sure, it’s useful, but the extent to which we’re digitally processing payments today poses quite a few security challenges for the retail sector.

Read More

Topics: PKI, Cyber Security, Retail

Posts by Topic

see all

Subscribe to Email Updates

Want to Learn more about CSS?