PKI Blog

Layering Certificate-based Authentication Security onto ThingWorx IoT Platform

Posted by CSS Technical Team on May 19, 2017 1:59:29 PM

Congratulations, you’ve chosen ThingWorx to launch and manage your IoT devices, applications and data. Your goals are clear, your code has been tested and the connections are ready to engage. Unfortunately, you’ve forgotten a critical component that will sadly cause your entire project to fail.

Added layers of security, specifically unique device key authentication.

Read More

Topics: IoT, Internet of Things (IoT), PKI for IoT, Cyber Security, ThingWorx

CSS to Attend RSA 2017, Featuring CMS Sapphire for PKI-as-a-Service (PKIaaS), CMS VerdeTTo IoT Directory Services, and CMS Topaz for Cloud Apps.

Posted by CSS Technical Team on Feb 9, 2017 3:06:59 PM

Planning on attending RSA 2017? Connect with CSS!

Are You Attending RSA 2017? Connect with the Cyber Security Experts at Certified Security Solutions

Certified Security Solutions (CSS) will be attending the 2017 RSA Conference in San Francisco this February. Our full team will be in attendance, and we’re looking forward to getting to know the information security professionals of the community and interfacing with attendees. We will also be featuring our latest solutions that include CMS Sapphire for PKI-as-a-Service, CMS VerdeTTo IoT Directory Services, and CMS Topaz for Cloud Apps and Application Developers.

Read More

Topics: RSA, PKI, IoT

The Threat Landscape of Manufacturing

Posted by CSS Technical Team on Jan 12, 2017 4:14:29 PM

Manufacturing is Contending with a Changing Risk Environment

An Overview of Cyber Threats to Manufacturing

Manufacturing is a widespread industry with a lot of components. Mass production, purchasing, selling, and the information and data management necessary to oversee it all largely make up the inner workings of the day-to-day in manufacturing. All manufacturers today are facing cybersecurity issues, including communication security, internet security, protecting customer information and managing sensitive information such as trade secrets and credit card or financial data through production and control systems. It’s a heavy burden to bear.

Read More

Topics: PKI, IoT, Cyber Security, manufacturing

Fog Computing and the IoT

Posted by CSS Technical Team on Nov 28, 2016 2:06:17 PM

Fog Computing: When the Cloud is Not Enough

How Do We Manage the Massive Amounts of Data Generated by the IoT?

The Internet of Things (IoT) market and its exponential growth are bringing many improvements and considerable revenue to almost every conceivable vertical. Now that most industries have a handle on what the IoT is, the public is watching it benefit both consumers and businesses alike. The IoT is generating detailed insights into consumer behavior, thereby improving product design and functionality, and also, according to Cisco, accelerates response to events, which ultimately enhances safety, improves service levels and increases output.

Read More

Topics: embedded certificates, SCEP, X.509 digital certificates, Internet of Things, IoT, PKI for IoT, Fog Computing, Root of Trust, Device Security

How Cloud-Based Services and IoT are Influencing PKI Deployments

Posted by CSS Technical Team on Nov 20, 2016 10:19:13 PM

Cloud-based Services and the Internet of Things (IoT) Driving PKI

The Explosion of Cloud-based Apps and the IoT are Creating the Need to Reinforce PKI Environments 

The takeover of the cloud has brought countless businesses to pursue cloud migration over the past few years in an effort to take advantage of cost and operational efficiencies. The shift began with storage and simpler applications such as email, and has progressed to more complex applications, many of which require authorization and security to be used.

Read More

Topics: embedded certificates, SCEP, PKI, X.509 digital certificates, Internet of Things, IoT, Cyber Security, PKI in the Cloud, Cloud based, Root of Trust, IoT Identity Management

2017 Public Key Infrastructure (PKI) and Internet of Things (IoT) Security Predictions

Posted by CSS Technical Team on Nov 17, 2016 2:19:26 PM

The World of PKI and IoT in 2017

In 2017, Public Key Infrastructure (PKI) will continue to solidify its place as a fundamental digital identification, authentication and encryption standard—especially as the Internet of Things (IoT) evolves and security concerns heighten. The need for trusted digital identities will become paramount to the overall security of the Internet. As businesses attempt to secure the IoT, PKI is re-emerging as a cost-effective and proven technology that delivers a secure and high-performance solution.

Read More

Topics: PKI, IoT, SHA1, SHA2, blockchain, 2017

Securing Network-Connected Sensors in the Energy Industry

Posted by CSS Technical Team on Oct 20, 2016 1:24:39 PM

How Can the Energy Sector Protect Itself From Cyber Threats?

The Takeover of Network-Connected Sensors in the Energy Industry

The problems of the energy sector, including increasing conservation efforts, greater emphasis on alternative energy sources, and the concurrent use of more power, may be a challenge to resolve, but many solutions lie in technology; particularly the innovations available through Internet of Things applications, as pointed out by Deloitte.

Read More

Topics: Internet of Things, IoT, energy iot

The Risks of Cryptographic Anarchy

Posted by Wayne Harris on Jun 15, 2016 11:46:34 AM

Why are we talking about assurance?

‘Assurance’ in the realm of PKI, tends to be one of those topics that is almost guaranteed to send a PKI design meeting down a rabbit hole. And unfortunately, many customers prefer the blue pill, rather than committing to an effort commensurate with a rigorous examination of risk, impact and assurance in the certificate space.

Read More

Topics: PKI, Internet of Things, IoT, PKI CA, IoT Security, PKI for IoT

SAP's "The importance of client certificates in IoT"

Posted by Ted Shorter on Jun 9, 2016 1:56:24 PM

Jay Thoden van Velzen from SAP recently published a very interesting blog describing the use of certificate metadata as a mechanism to enhance IoT authentication.  We wholeheartedly agree with the approach.  CSS’ VerdeTTo solution is based on a similar concept, and allows us to leverage the massive scalability and certificate metadata capabilities of our CMS PKI operations management platform to transform certificates and metadata into device identities, attributes, and authenticators.

Read More

Topics: IoT, Internet of Things (IoT), SAP

Authentication in an Ultra-Connected World: Internet of Things

Posted by Ted Shorter on Oct 1, 2015 6:05:00 AM

As PKI practitioners, we’ve been asked the question for years: “What’s the best way to get a digital certificate on _____?” What gets filled into the blank has expanded dramatically over time, however. Ten years ago, certificates landed primarily on what I’d describe as “traditional” IT infrastructure – servers, desktops, laptops, smart cards, RADIUS servers, or VPN concentrators. But since then, things have gotten much more interesting. Handheld scanners. Surgical robots. VOIP phones. Set-top boxes. Cable modems. Even heart monitors and IV pumps.

Read More

Topics: install certificates onto devices, digital certificates, cert, embedded systems, certificate, Microsoft Security Partner, expired digital certificate, Public Key Infrastructure, Certificate Management System (CMS), Industry Trends, Microsoft Public Key Infrastructure, Cisco Internet of Things, embedded certificates, embedded devices, Microsoft PKI, X.509 digital certificates, Internet of Things, IoT, Blog, Internet of Things (IoT), certificate install, BYOD, PKI Assurance

Posts by Topic

see all

Want to Learn more about CSS?