PKI Blog

CSS Technical Team

CSS Technical Team

Recent Posts

CSS to Attend RSA 2017, Featuring CMS Sapphire for PKI-as-a-Service (PKIaaS), CMS VerdeTTo IoT Directory Services, and CMS Topaz for Cloud Apps.

Posted by CSS Technical Team on Feb 9, 2017 3:06:59 PM

Planning on attending RSA 2017? Connect with CSS!

Are You Attending RSA 2017? Connect with the Cyber Security Experts at Certified Security Solutions

Certified Security Solutions (CSS) will be attending the 2017 RSA Conference in San Francisco this February. Our full team will be in attendance, and we’re looking forward to getting to know the information security professionals of the community and interfacing with attendees. We will also be featuring our latest solutions that include CMS Sapphire for PKI-as-a-Service, CMS VerdeTTo IoT Directory Services, and CMS Topaz for Cloud Apps and Application Developers.

Read More

Topics: RSA, PKI, IoT

Security Considerations of the Aerospace and Defense Industry

Posted by CSS Technical Team on Feb 3, 2017 10:25:33 AM

Cyber Threats to Aerospace and Defense


 Cyber Threat Conditions in Aerospace and Defense  

As one can imagine, the aerospace and defense industry is full of highly sensitive data. When you consider their primary customers, namely the federal government and federal space programs, it’s no surprise that the kind of information commonly transmitted is extremely classified by nature.

Read More

Topics: PKI, Cyber Security, Cyber Threats, Aerospace

Cyber Threats to Telecom

Posted by CSS Technical Team on Jan 26, 2017 7:17:12 PM

Evolving Challenges of Cyber Security in Telecommunications

The Telecom Threat Environment

For the telecommunications sector, staying up-to-speed with information security challenges is a constant battle. Telecom organizations are expanding their reach and transforming into full-blown technology companies. Such a complex ecosystem for business means that the industry is facing unending IT threats, and will continue to have the need to balance a variety of compliance requirements. In engaging with millions of customers subscribing to services ranging from cable, the Internet, home and mobile phone service, and even data centers, the industry is operating within a heavily risk-laden environment.

Read More

Topics: PKI, Cyber Security

The Threat Landscape of Manufacturing

Posted by CSS Technical Team on Jan 12, 2017 4:14:29 PM

Manufacturing is Contending with a Changing Risk Environment

An Overview of Cyber Threats to Manufacturing

Manufacturing is a widespread industry with a lot of components. Mass production, purchasing, selling, and the information and data management necessary to oversee it all largely make up the inner workings of the day-to-day in manufacturing. All manufacturers today are facing cybersecurity issues, including communication security, internet security, protecting customer information and managing sensitive information such as trade secrets and credit card or financial data through production and control systems. It’s a heavy burden to bear.

Read More

Topics: PKI, IoT, Cyber Security, manufacturing

CSS Research Survey: Digital Identity Insights

Posted by CSS Technical Team on Jan 5, 2017 4:01:19 PM

CSS Presents Cyber Security Survey Results

 
A National Digital Identity Insights Survey

In Q4 2016, CSS Research surveyed information security professionals on their current and anticipated public key infrastructure (PKI) usage, as well as PKI challenges and plans for 2017.

CSS Research surveyed 105 respondents who manage cyber security tools in an evolving digital authentication landscape nationally.

Read More

Topics: PKI, Cyber Security

Cybersecurity in Retail: Facing the Threats of Today

Posted by CSS Technical Team on Dec 16, 2016 1:41:13 PM

Facing the Cybersecurity Challenges of the Retail Sector

Retail’s Cyber Threat Environment: Debit Cards, Credit Cards, and Surviving as a Popular Target

The Internet, technological evolution, and the “always on, always connected” nature of humanity today certainly enables many convenient capabilities. We can order dinner with the swipe of a finger, reserve movie tickets instantaneously and purchase clothing within seconds. Sure, it’s useful, but the extent to which we’re digitally processing payments today poses quite a few security challenges for the retail sector.

Read More

Topics: PKI, Cyber Security, Retail

5 PKI New Year's Resolutions for 2017

Posted by CSS Technical Team on Dec 12, 2016 11:40:51 AM

CSS Presents PKI Promises for the Security of Next Year

Making 2017 Your Business’ Most Secure Year

2016 was an eventful year for cyber security, from beginning to end. While longstanding security problems remained challenging, many new methods of executing cybercrime emerged and affected businesses throughout all industries, and a number of high-impact attacks glared among headlines throughout the year. 

Read More

Topics: digital certificate management, PKI, Cyber Security

Compliance Is Not Equivalent to Security

Posted by CSS Technical Team on Dec 5, 2016 3:29:01 PM

How Are Achieving Cyber Security Compliance and a Truly Secure State Different?

Achieving Compliance is Not Equivalent to Achieving an Actual Secure State

The backdrop of today’s information security landscape is riddled with demands of the myriad of industry and government compliance requirements for protecting information. From HIPAA to PCI to countless other industry and government compliance mandates, the regulations are complex and seemingly endless, and most businesses have to put a considerable amount of resources toward achieving and maintaining compliance.

Read More

Topics: IT Security, PKI, Cyber Security, Risk and Compliance

Fog Computing and the IoT

Posted by CSS Technical Team on Nov 28, 2016 2:06:17 PM

Fog Computing: When the Cloud is Not Enough

How Do We Manage the Massive Amounts of Data Generated by the IoT?

The Internet of Things (IoT) market and its exponential growth are bringing many improvements and considerable revenue to almost every conceivable vertical. Now that most industries have a handle on what the IoT is, the public is watching it benefit both consumers and businesses alike. The IoT is generating detailed insights into consumer behavior, thereby improving product design and functionality, and also, according to Cisco, accelerates response to events, which ultimately enhances safety, improves service levels and increases output.

Read More

Topics: embedded certificates, SCEP, X.509 digital certificates, Internet of Things, IoT, PKI for IoT, Fog Computing, Root of Trust, Device Security

How Cloud-Based Services and IoT are Influencing PKI Deployments

Posted by CSS Technical Team on Nov 20, 2016 10:19:13 PM

Cloud-based Services and the Internet of Things (IoT) Driving PKI

The Explosion of Cloud-based Apps and the IoT are Creating the Need to Reinforce PKI Environments 

The takeover of the cloud has brought countless businesses to pursue cloud migration over the past few years in an effort to take advantage of cost and operational efficiencies. The shift began with storage and simpler applications such as email, and has progressed to more complex applications, many of which require authorization and security to be used.

Read More

Topics: embedded certificates, SCEP, PKI, X.509 digital certificates, Internet of Things, IoT, Cyber Security, PKI in the Cloud, Cloud based, Root of Trust, IoT Identity Management

Posts by Topic

see all

Want to Learn more about CSS?