PKI Blog

Reflections on the 2017 Thales Data Threat Report

Posted by CSS Technical Team on Jun 2, 2017 1:40:54 PM
Trends in Encryption and Data Security Include Major Implications for the IoT

Key Trends of the 2017 Thales Data Threat Report

The Global Edition of the 2017 Thales Data Threat Report featured a number of trends in the data set which are noteworthy for enterprises invested in the IoT, as well as cloud security. The 2017 report is based on a survey of over 1,100 security executives across the globe, and emphasizes the security impacts of advanced technologies, including cloud, big data, IoT, and containers.

Read More

Topics: Thales e-Security, Encryption, IoT Security, Data Security

Layering Certificate-based Authentication Security onto ThingWorx IoT Platform

Posted by CSS Technical Team on May 19, 2017 1:59:29 PM

Congratulations, you’ve chosen ThingWorx to launch and manage your IoT devices, applications and data. Your goals are clear, your code has been tested and the connections are ready to engage. Unfortunately, you’ve forgotten a critical component that will sadly cause your entire project to fail.

Added layers of security, specifically unique device key authentication.

Read More

Topics: IoT, Internet of Things (IoT), PKI for IoT, Cyber Security, ThingWorx

How Will Blockchain Impact PKI?

Posted by Ted Shorter on May 18, 2017 8:49:05 AM

As CTO at Certified Security Solutions, I’ve been asked the question more and more lately, how will Blockchain impact PKI?”  

There’s so much mysticism around Blockchain technology today that it can become difficult to separate the reality from the hype, and the logical conclusions from wild speculation.  Nonetheless, digital certificates, and other identity-related technologies such as Public Key Infrastructure (PKI), Federation and OAuth are a core component of many systems today, so it’s logical to examine how a disruptive technology such as Blockchain will affect these technologies.

Read More

Topics: blockchain help, blockchain security, blockchain, blockchain pki, what is blockchain, public key infrastructure blockchain

Google Chrome Version 58: Short and Long Term Fixes

Posted by CSS Technical Team on May 5, 2017 2:02:23 PM

With Google’s recent Chrome 58 version update, your Public Key Infrastructure (PKI) may suddenly be impacted. Your formerly-compliant HTTPS certificates may no longer be working. CSS is here to explain what has changed, why has it changed and how to identify which certificates may be impacted. We will look at a temporary Google Chrome work around and view best practice security settings to adopt when working with SANs (Subject Alternative Name) certificates.

Read More

Topics: expired certs, Public Key Infrastructure (PKI), Google Chrome Version 58, CRL Monitoring, Certificate Provisioning, PKI for chrome

SCEP Shortcomings

Posted by Ted Shorter on Mar 27, 2017 4:17:51 PM

Despite the documented shortcomings of the Simple Certificate Enrollment Protocol (SCEP), it is still in widespread use today. This is in large part due to the lack of better options when it comes to certificate enrollment – especially when it comes to more limited devices such as mobile phones, tablets, and constrained Internet-of-Things (IoT) devices such as embedded systems, sensors, automotive components, or medical devices. The simplicity of SCEP makes it an attractive choice for implementers that are bent on meeting tight timelines, but this simplicity can come at a cost.

Read More

Topics: SCEP, Simple Certificate Enrollment Protocol

SHA-1 is “Shattered”

Posted by Wayne Harris on Mar 22, 2017 11:41:01 AM

SHA-1 has been in the news (again). We’ve all known that the SHA-1 hash function is cryptographically weak. In fact, CSS has been pointing out the weaknesses of SHA-1 for years now.


Read More

Topics: SHA-1, SHA-2

CSS to Attend RSA 2017, Featuring CMS Sapphire for PKI-as-a-Service (PKIaaS), CMS VerdeTTo IoT Directory Services, and CMS Topaz for Cloud Apps.

Posted by CSS Technical Team on Feb 9, 2017 3:06:59 PM

Planning on attending RSA 2017? Connect with CSS!

Are You Attending RSA 2017? Connect with the Cyber Security Experts at Certified Security Solutions

Certified Security Solutions (CSS) will be attending the 2017 RSA Conference in San Francisco this February. Our full team will be in attendance, and we’re looking forward to getting to know the information security professionals of the community and interfacing with attendees. We will also be featuring our latest solutions that include CMS Sapphire for PKI-as-a-Service, CMS VerdeTTo IoT Directory Services, and CMS Topaz for Cloud Apps and Application Developers.

Read More

Topics: RSA, PKI, IoT

Security Considerations of the Aerospace and Defense Industry

Posted by CSS Technical Team on Feb 3, 2017 10:25:33 AM

Cyber Threats to Aerospace and Defense


 Cyber Threat Conditions in Aerospace and Defense  

As one can imagine, the aerospace and defense industry is full of highly sensitive data. When you consider their primary customers, namely the federal government and federal space programs, it’s no surprise that the kind of information commonly transmitted is extremely classified by nature.

Read More

Topics: PKI, Cyber Security, Cyber Threats, Aerospace

Cyber Threats to Telecom

Posted by CSS Technical Team on Jan 26, 2017 7:17:12 PM

Evolving Challenges of Cyber Security in Telecommunications

The Telecom Threat Environment

For the telecommunications sector, staying up-to-speed with information security challenges is a constant battle. Telecom organizations are expanding their reach and transforming into full-blown technology companies. Such a complex ecosystem for business means that the industry is facing unending IT threats, and will continue to have the need to balance a variety of compliance requirements. In engaging with millions of customers subscribing to services ranging from cable, the Internet, home and mobile phone service, and even data centers, the industry is operating within a heavily risk-laden environment.

Read More

Topics: PKI, Cyber Security

The Threat Landscape of Manufacturing

Posted by CSS Technical Team on Jan 12, 2017 4:14:29 PM

Manufacturing is Contending with a Changing Risk Environment

An Overview of Cyber Threats to Manufacturing

Manufacturing is a widespread industry with a lot of components. Mass production, purchasing, selling, and the information and data management necessary to oversee it all largely make up the inner workings of the day-to-day in manufacturing. All manufacturers today are facing cybersecurity issues, including communication security, internet security, protecting customer information and managing sensitive information such as trade secrets and credit card or financial data through production and control systems. It’s a heavy burden to bear.

Read More

Topics: PKI, IoT, Cyber Security, manufacturing

Posts by Topic

see all

Subscribe to Email Updates

Want to Learn more about CSS?