PKI Blog

Enterprise IT Scenarios Demanding Crypto-Agility

Posted by CSS Technical Team on Aug 6, 2018 3:20:50 PM

 In an evolving cyber security landscape, defenses must continually evolve. Static systems are not only inherently insecure, they are less so with each passing day. This principle applies to cryptography as much as to other types of cyber-defenses. And with the advent of quantum computing, most analysts agree that common cryptographic algorithms will eventually become ineffective. The scale of the potential threat is immense — for nearly all the hardware and software we use in both traditional IT environments and burgeoning Internet of Things (IoT) ecosystems.

Read More

Topics: digital identity, Cryptography, Crypto-agility, quantum computing

How to Find and Protect Code Signing Certificates

Posted by CSS Technical Team on Apr 6, 2018 11:33:57 AM

The demand for trust in today's uber-connected digital society is unprecedented. Consumers of software require guaranteed proof that the application they are using is legitimate. Secure code signing validates the author of the software and proves that the code has not been altered or tampered with after it was signed. Trusted code signing certificates are used to verify authenticity, but what is preserving the integrity of those certificates?

Read More

Topics: Public Key Infrastructure (PKI), Crypto-agility, weakening cryptography, secure code signing, find code signing certificates

Recent Posts

Posts by Topic

see all

Subscribe to Email Updates

Want to Learn more about CSS?