PKI Blog

Compliance Is Not Equivalent to Security

Posted by CSS Technical Team on Dec 5, 2016 3:29:01 PM

How Are Achieving Cyber Security Compliance and a Truly Secure State Different?

Achieving Compliance is Not Equivalent to Achieving an Actual Secure State

The backdrop of today’s information security landscape is riddled with demands of the myriad of industry and government compliance requirements for protecting information. From HIPAA to PCI to countless other industry and government compliance mandates, the regulations are complex and seemingly endless, and most businesses have to put a considerable amount of resources toward achieving and maintaining compliance.

Read More

Topics: IT Security, PKI, Cyber Security, Risk and Compliance

Fog Computing and the IoT

Posted by CSS Technical Team on Nov 28, 2016 2:06:17 PM

Fog Computing: When the Cloud is Not Enough

How Do We Manage the Massive Amounts of Data Generated by the IoT?

The Internet of Things (IoT) market and its exponential growth are bringing many improvements and considerable revenue to almost every conceivable vertical. Now that most industries have a handle on what the IoT is, the public is watching it benefit both consumers and businesses alike. The IoT is generating detailed insights into consumer behavior, thereby improving product design and functionality, and also, according to Cisco, accelerates response to events, which ultimately enhances safety, improves service levels and increases output.

Read More

Topics: embedded certificates, SCEP, X.509 digital certificates, Internet of Things, IoT, PKI for IoT, Fog Computing, Root of Trust, Device Security

How Cloud-Based Services and IoT are Influencing PKI Deployments

Posted by CSS Technical Team on Nov 20, 2016 10:19:13 PM

Cloud-based Services and the Internet of Things (IoT) Driving PKI

The Explosion of Cloud-based Apps and the IoT are Creating the Need to Reinforce PKI Environments 

The takeover of the cloud has brought countless businesses to pursue cloud migration over the past few years in an effort to take advantage of cost and operational efficiencies. The shift began with storage and simpler applications such as email, and has progressed to more complex applications, many of which require authorization and security to be used.

Read More

Topics: embedded certificates, SCEP, PKI, X.509 digital certificates, Internet of Things, IoT, Cyber Security, PKI in the Cloud, Cloud based, Root of Trust, IoT Identity Management

2017 Public Key Infrastructure (PKI) and Internet of Things (IoT) Security Predictions

Posted by CSS Technical Team on Nov 17, 2016 2:19:26 PM

The World of PKI and IoT in 2017

In 2017, Public Key Infrastructure (PKI) will continue to solidify its place as a fundamental digital identification, authentication and encryption standard—especially as the Internet of Things (IoT) evolves and security concerns heighten. The need for trusted digital identities will become paramount to the overall security of the Internet. As businesses attempt to secure the IoT, PKI is re-emerging as a cost-effective and proven technology that delivers a secure and high-performance solution.

Read More

Topics: PKI, IoT, SHA1, SHA2, blockchain, 2017

FinTech and PCI DSS: Effectively Securing Financial Data

Posted by CSS Technical Team on Nov 11, 2016 2:33:40 PM

PKI and Digital Certificates as a Solution for PCI Compliance

Cyber Threats of the Financial Sector

Financial services is navigating an interesting time: eight years have passed since the crash of 2008, allowing enough time for market healing, while mass digitalization has taken a strong hold. Online portals and mobile apps are the norm, among a slew of other technology innovations being adopted in financial services to respond to the high demands of today’s digital consumer. Sure, these changes bring greater convenience to the customer and increased cost efficiency to the institutions, but it also brings significantly higher cyber security risks. 

Read More

Topics: digital certificate, PKI, Cyber Security, Financial Security

The Importance of PKI Health Checks

Posted by CSS Technical Team on Oct 31, 2016 11:26:53 AM

Health checks are critical to maintaining Public Key Infrastructures (PKI) and a strong overall security posture, but they’re overlooked too often. 

 Public Key Infrastructure (PKI) is Not a “Set and Forget” Scenario

It’s common knowledge among security experts that a strong PKI is a critical aspect of cybersecurity programs. Many security organizations tend to put a great deal of resources toward planning and implementation, but neglect its care and feeding, which is just as detrimental as improperly setting up a PKI.

Public key infrastructure is not a “set and forget” kind of security tool. It may be tempting to leave it alone once it’s up and running, but this is a grave mistake—continual monitoring and management are critical to ensuring the highest possible levels of security.

Read More

Topics: PKI, Cyber Security, Importance of a PKI Heath Check, PKI Health Check

Blockchain Demystified

Posted by Ted Shorter on Oct 28, 2016 8:56:44 AM

Blockchain Unblocked - What it is and what it is not

Blockchain technology has become a topic of major discussion in the past year or two.  There’s no question that the technology holds significant promise for the future… and it’s not just startups that think so:  IBM, Microsoft, Cisco, SAP, and many other major companies are investing billions of dollars in blockchain research.

Read More

Topics: blockchain help, blockchain security, blockchain, blockchain pki, what is blockchain

The Convergence of IT & Security and Risk & Compliance

Posted by CSS Technical Team on Oct 25, 2016 12:00:36 PM

IT and Compliance Departments Working Together With Greater Frequency


The Integration between IT and Compliance

Presently, a marked shift from the silos of IT and compliance teams is resulting in a departmental convergence for many businesses. A tightening and consolidation effort between IT, security, and GRC has proven to benefit overall organization security posture, and many businesses are making the change.

Read More

Topics: IT Security, PKI, Cyber Security, Risk and Compliance

Securing Network-Connected Sensors in the Energy Industry

Posted by CSS Technical Team on Oct 20, 2016 1:24:39 PM

How Can the Energy Sector Protect Itself From Cyber Threats?

The Takeover of Network-Connected Sensors in the Energy Industry

The problems of the energy sector, including increasing conservation efforts, greater emphasis on alternative energy sources, and the concurrent use of more power, may be a challenge to resolve, but many solutions lie in technology; particularly the innovations available through Internet of Things applications, as pointed out by Deloitte.

Read More

Topics: Internet of Things, IoT, energy iot

SHA-2 Migration Timelines are Looming

Posted by CSS Technical Team on Oct 18, 2016 8:50:41 AM

Are You Ready for the Move
to SHA-2?

Is your business ready for SHA-1 deprecation? The timelines for the move to SHA-2 are looming, and deprecation is fast-approaching. Explained by InfoWorld, SHA-1 was once considered secure, but has been proven to contain cryptographic flaws. Security experts and cryptographers believe that the SHA-1 hash is no longer secure—and its shelf life is dwindling quickly.

Read More

Topics: PKI, SHA-2, SHA-2 Migration

Posts by Topic

see all

Want to Learn more about CSS?