PKI Blog

How to Regain Control of Compromised IoT Device Certificates

Posted by JD Kilgallin on Apr 25, 2018 3:19:42 PM

Imagine a world with no access controls. A free for all resulting in chaos thanks to broken processes, zero audit trails, and no way to administer rights to the appropriate devices or people. Luckily, today’s IoT driven world is layered with access controls designed to streamline and simplify alongside of prioritizing the most important aspect - security.

With CMS VerdeTTo and the VerdeTTo Access Valve for ThingWorx, devices can be constrained to only access systems under certain conditions, such as connecting from certain known locations or during certain expected operating hours. VerdeTTo also allows devices with compromised certificates to quickly be disabled, preventing them from accessing network resources and systems.

Just one click changes a metadata value for the compromised certificates through the VerdeTTo portal, while the VerdeTTo Access Valve immediately terminates the device’s access to the ThingWorx platform. But once a device is compromised (especially if a broad range of devices are compromised) how do you securely bring everything back online?

Read More

Topics: Public Key Infrastructure, PKI, IoT, Internet of Things (IoT), LiveWorx, Cryptography

2018 Predictions for the Internet of Things (IoT)

Posted by Anthony Ricci on Jan 5, 2018 11:32:34 AM

As with any new year, there are with plenty of expectations and predictions.  There is nothing different about this year.  Especially as it relates to the Internet of Things (IoT). With over 20 billion current “connected” devices and an expected 6 trillion dollars by 2020, there are not a “lack” of predictions.  Even less surprising are the security concerns surrounding these devices.  With every new device that is activated, security exposure becomes exponentially greater.

Read More

Topics: IoT, Internet of Things (IoT), IoT Security

SCARIER THINGS: Protect Your IoT Assets with HSMs

Posted by Anthony Ricci on Oct 11, 2017 11:47:25 AM

Although Halloween happens once a year, evil lurks in the digital IoT world all year round.  Systems must be protected 24/7/365 to ensure that the ‘Demogorgon’ does not make it’s way through the portal into the system.  One concern is the protection of our cryptographic keys.  Although there are many ways to accomplish this, it is not an easy decision.

Read More

Topics: Public Key Infrastructure, PKI, Hardware Security Module, IoT, Internet of Things (IoT), HSM, LiveWorx

“CAN YOU KEEP A SECRET?” KEEPING YOUR IOT DEVICES SAFE AND SECURE–CRYPTOGRAPHY 101

Posted by Anthony Ricci on Sep 13, 2017 10:35:59 AM

Why do I care about cryptography as an IoT architect? What is the deal with cryptography? Why does cryptography matter in the IoT world?

Currently, it is estimated that there are about 8.4 billion devices online.  Within the next 3 years, the number will be over 20.4 billion devices.  As more connected devices are deployed, there becomes a greater need to control and manage the identity of those devices. There is also a need to protect the devices “data at rest” and “data that is transmitted.” Cryptography gives us a way to do that with high assurance and reliability.

 

Read More

Topics: Public Key Infrastructure, PKI, IoT, Internet of Things (IoT), LiveWorx, Cryptography

“HEY THERE, IT’S ME” – Understanding the Importance of IoT Device Identity

Posted by Anthony Ricci on Aug 16, 2017 11:26:40 AM

Do you remember the movie E.T, where E.T is essentially stranded on Earth until he assembles a makeshift communication device which sends a message to his spaceship to return to earth to retrieve him?

Read More

Topics: Internet of Things, IoT, IoT Identity Management, LiveWorx

Layering Certificate-based Authentication Security onto ThingWorx IoT Platform

Posted by CSS Technical Team on May 19, 2017 1:59:29 PM

Congratulations, you’ve chosen ThingWorx to launch and manage your IoT devices, applications and data. Your goals are clear, your code has been tested and the connections are ready to engage. Unfortunately, you’ve forgotten a critical component that will sadly cause your entire project to fail.

Added layers of security, specifically unique device key authentication.

Read More

Topics: IoT, Internet of Things (IoT), PKI for IoT, Cyber Security, ThingWorx

CSS to Attend RSA 2017, Featuring CMS Sapphire for PKI-as-a-Service (PKIaaS), CMS VerdeTTo IoT Directory Services, and CMS Topaz for Cloud Apps.

Posted by CSS Technical Team on Feb 9, 2017 3:06:59 PM

Planning on attending RSA 2017? Connect with CSS!

Are You Attending RSA 2017? Connect with the Cyber Security Experts at Certified Security Solutions

Certified Security Solutions (CSS) will be attending the 2017 RSA Conference in San Francisco this February. Our full team will be in attendance, and we’re looking forward to getting to know the information security professionals of the community and interfacing with attendees. We will also be featuring our latest solutions that include CMS Sapphire for PKI-as-a-Service, CMS VerdeTTo IoT Directory Services, and CMS Topaz for Cloud Apps and Application Developers.

Read More

Topics: RSA, PKI, IoT

The Threat Landscape of Manufacturing

Posted by CSS Technical Team on Jan 12, 2017 4:14:29 PM

Manufacturing is Contending with a Changing Risk Environment

An Overview of Cyber Threats to Manufacturing

Manufacturing is a widespread industry with a lot of components. Mass production, purchasing, selling, and the information and data management necessary to oversee it all largely make up the inner workings of the day-to-day in manufacturing. All manufacturers today are facing cybersecurity issues, including communication security, internet security, protecting customer information and managing sensitive information such as trade secrets and credit card or financial data through production and control systems. It’s a heavy burden to bear.

Read More

Topics: PKI, IoT, Cyber Security, manufacturing

Fog Computing and the IoT

Posted by CSS Technical Team on Nov 28, 2016 2:06:17 PM

Fog Computing: When the Cloud is Not Enough

How Do We Manage the Massive Amounts of Data Generated by the IoT?

The Internet of Things (IoT) market and its exponential growth are bringing many improvements and considerable revenue to almost every conceivable vertical. Now that most industries have a handle on what the IoT is, the public is watching it benefit both consumers and businesses alike. The IoT is generating detailed insights into consumer behavior, thereby improving product design and functionality, and also, according to Cisco, accelerates response to events, which ultimately enhances safety, improves service levels and increases output.

Read More

Topics: embedded certificates, SCEP, X.509 digital certificates, Internet of Things, IoT, PKI for IoT, Fog Computing, Root of Trust, Device Security

How Cloud-Based Services and IoT are Influencing PKI Deployments

Posted by CSS Technical Team on Nov 20, 2016 10:19:13 PM

Cloud-based Services and the Internet of Things (IoT) Driving PKI

The Explosion of Cloud-based Apps and the IoT are Creating the Need to Reinforce PKI Environments 

The takeover of the cloud has brought countless businesses to pursue cloud migration over the past few years in an effort to take advantage of cost and operational efficiencies. The shift began with storage and simpler applications such as email, and has progressed to more complex applications, many of which require authorization and security to be used.

Read More

Topics: embedded certificates, SCEP, PKI, X.509 digital certificates, Internet of Things, IoT, Cyber Security, PKI in the Cloud, Cloud based, Root of Trust, IoT Identity Management

Recent Posts

Posts by Topic

see all

Subscribe to Email Updates

Want to Learn more about CSS?