PKI Blog

How to Regain Control of Compromised IoT Device Certificates

Posted by JD Kilgallin on Apr 25, 2018 3:19:42 PM

Imagine a world with no access controls. A free for all resulting in chaos thanks to broken processes, zero audit trails, and no way to administer rights to the appropriate devices or people. Luckily, today’s IoT driven world is layered with access controls designed to streamline and simplify alongside of prioritizing the most important aspect - security.

With CMS VerdeTTo and the VerdeTTo Access Valve for ThingWorx, devices can be constrained to only access systems under certain conditions, such as connecting from certain known locations or during certain expected operating hours. VerdeTTo also allows devices with compromised certificates to quickly be disabled, preventing them from accessing network resources and systems.

Just one click changes a metadata value for the compromised certificates through the VerdeTTo portal, while the VerdeTTo Access Valve immediately terminates the device’s access to the ThingWorx platform. But once a device is compromised (especially if a broad range of devices are compromised) how do you securely bring everything back online?

Read More

Topics: Cryptography, PKI, Internet of Things (IoT), IoT, LiveWorx, Public Key Infrastructure

THE CIRCLE OF TRUST FOR CONNECTED DEVICES

Posted by Anthony Ricci on Dec 7, 2017 9:39:19 AM

When it comes to connected devices, how big should your "Circle of Trust" be?  Who should you trust, and why?

As told by Jack Byrnes ("Meet the Parents"), who should you trust and why?

Read More

Topics: Internet of Things (IoT), LiveWorx, ThingWorx, Connected Devices, Root of Trust, PKI, Public Key Infrastructure

SCARIER THINGS: Protect Your IoT Assets with HSMs

Posted by Anthony Ricci on Oct 11, 2017 11:47:25 AM

Although Halloween happens once a year, evil lurks in the digital IoT world all year round.  Systems must be protected 24/7/365 to ensure that the ‘Demogorgon’ does not make it’s way through the portal into the system.  One concern is the protection of our cryptographic keys.  Although there are many ways to accomplish this, it is not an easy decision.

Read More

Topics: PKI, Internet of Things (IoT), IoT, LiveWorx, Public Key Infrastructure, HSM, Hardware Security Module

“CAN YOU KEEP A SECRET?” KEEPING YOUR IOT DEVICES SAFE AND SECURE–CRYPTOGRAPHY 101

Posted by Anthony Ricci on Sep 13, 2017 10:35:59 AM

Why do I care about cryptography as an IoT architect? What is the deal with cryptography? Why does cryptography matter in the IoT world?

Currently, it is estimated that there are about 8.4 billion devices online.  Within the next 3 years, the number will be over 20.4 billion devices.  As more connected devices are deployed, there becomes a greater need to control and manage the identity of those devices. There is also a need to protect the devices “data at rest” and “data that is transmitted.” Cryptography gives us a way to do that with high assurance and reliability.

 

Read More

Topics: Cryptography, PKI, Internet of Things (IoT), IoT, LiveWorx, Public Key Infrastructure

“HEY THERE, IT’S ME” – Understanding the Importance of IoT Device Identity

Posted by Anthony Ricci on Aug 16, 2017 11:26:40 AM

Do you remember the movie E.T, where E.T is essentially stranded on Earth until he assembles a makeshift communication device which sends a message to his spaceship to return to earth to retrieve him?

Read More

Topics: IoT, IoT Identity Management, Internet of Things, LiveWorx

Recent Posts

Posts by Topic

see all

Subscribe to Email Updates

Want to Learn more about CSS?