PKI Blog

THE CIRCLE OF TRUST FOR CONNECTED DEVICES

Posted by Anthony Ricci on Dec 7, 2017 9:39:19 AM

When it comes to connected devices, how big should your "Circle of Trust" be?  Who should you trust, and why?

As told by Jack Byrnes ("Meet the Parents"), who should you trust and why?

Read More

Topics: Public Key Infrastructure, PKI, Internet of Things (IoT), Root of Trust, ThingWorx, LiveWorx, Connected Devices

SCARIER THINGS: Protect Your IoT Assets with HSMs

Posted by Anthony Ricci on Oct 11, 2017 11:47:25 AM

Although Halloween happens once a year, evil lurks in the digital IoT world all year round.  Systems must be protected 24/7/365. 

Although Halloween happens once a year, evil lurks in the digital IoT world all year round.  Systems must be protected 24/7/365 to ensure that the ‘Demogorgon’ does not make it’s way through the portal into the system.  One concern is the protection of our cryptographic keys.  Although there are many ways to accomplish this, it is not an easy decision.

Read More

Topics: Public Key Infrastructure, PKI, Hardware Security Module, IoT, Internet of Things (IoT), HSM, LiveWorx

Who’s Watching Your Public Key Infrastructure (PKI)?

Posted by Andrew Prayner on Oct 6, 2017 10:28:43 AM

If you're not watching your PKI...who is?

 As ominous as the title sounds, this blog will actually focus on the parties that should have eyes on your public key infrastructure (PKI), rather than the “bad actors” who shouldn’t.  The latter is no less important, however, and that could easily be the topic of a future blog.

Read More

Topics: Managed PKI, Public Key Infrastructure, PKI, DIY PKI

“CAN YOU KEEP A SECRET?” KEEPING YOUR IOT DEVICES SAFE AND SECURE–CRYPTOGRAPHY 101

Posted by Anthony Ricci on Sep 13, 2017 10:35:59 AM

Why do I care about cryptography as an IoT architect? What is the deal with cryptography? Why does cryptography matter in the IoT world?

Currently, it is estimated that there are about 8.4 billion devices online.  Within the next 3 years, the number will be over 20.4 billion devices.  As more connected devices are deployed, there becomes a greater need to control and manage the identity of those devices. There is also a need to protect the devices “data at rest” and “data that is transmitted.” Cryptography gives us a way to do that with high assurance and reliability.

 

Read More

Topics: Public Key Infrastructure, PKI, IoT, Internet of Things (IoT), LiveWorx, Cryptography

You have choices in certificate and PKI management – Why CSS?

Posted by Tom Klein on Aug 10, 2017 3:41:43 PM

The quandary in buying a solution to any business problem is am I making the best choice and will our company derive value from that selection?

In representing a variety of solutions to customers over more than 35 years, I have found a few consistent characteristics of customers that have been happy with their decision.

Read More

Topics: PKI, Public Key Infrastructure (PKI)

How I Lost Control of My PKI

Posted by Ex-PKI Guy on Jun 27, 2017 9:24:02 AM

My alarm signals like an acoustic guitar. I really need to change that sound – it’s starting to get on my nerves. A quick email scan before I begin my morning routine. Justin was finally able to get the domain joined machines in the correct group policy – nice. Next email, a support ticket stating access to the vacation request system was denied. Probably just another user error, I’d get to it later on.

Read More

Topics: Public Key Infrastructure, PKI

The Real Cost of an Expired Digital Certificate

Posted by CSS Technical Team on Jun 22, 2017 1:03:04 PM

The average global 5,000 company spends about $15 million to recover from a certificate outage. These estimates are based on a Ponemon survey of about 2,400 global respondents which include remediation costs, loss of productivity, lost revenues, and brand image damage.

Read More

Topics: digital certificate, Public Key Infrastructure, PKI, Digital Identity Management, Unplanned Outages

CSS to Attend RSA 2017, Featuring CMS Sapphire for PKI-as-a-Service (PKIaaS), CMS VerdeTTo IoT Directory Services, and CMS Topaz for Cloud Apps.

Posted by CSS Technical Team on Feb 9, 2017 3:06:59 PM

Planning on attending RSA 2017? Connect with CSS!

Are You Attending RSA 2017? Connect with the Cyber Security Experts at Certified Security Solutions

Certified Security Solutions (CSS) will be attending the 2017 RSA Conference in San Francisco this February. Our full team will be in attendance, and we’re looking forward to getting to know the information security professionals of the community and interfacing with attendees. We will also be featuring our latest solutions that include CMS Sapphire for PKI-as-a-Service, CMS VerdeTTo IoT Directory Services, and CMS Topaz for Cloud Apps and Application Developers.

Read More

Topics: RSA, PKI, IoT

Security Considerations of the Aerospace and Defense Industry

Posted by CSS Technical Team on Feb 3, 2017 10:25:33 AM

Cyber Threats to Aerospace and Defense


 Cyber Threat Conditions in Aerospace and Defense  

As one can imagine, the aerospace and defense industry is full of highly sensitive data. When you consider their primary customers, namely the federal government and federal space programs, it’s no surprise that the kind of information commonly transmitted is extremely classified by nature.

Read More

Topics: PKI, Cyber Security, Cyber Threats, Aerospace

Cyber Threats to Telecom

Posted by CSS Technical Team on Jan 26, 2017 7:17:12 PM

Evolving Challenges of Cyber Security in Telecommunications

The Telecom Threat Environment

For the telecommunications sector, staying up-to-speed with information security challenges is a constant battle. Telecom organizations are expanding their reach and transforming into full-blown technology companies. Such a complex ecosystem for business means that the industry is facing unending IT threats, and will continue to have the need to balance a variety of compliance requirements. In engaging with millions of customers subscribing to services ranging from cable, the Internet, home and mobile phone service, and even data centers, the industry is operating within a heavily risk-laden environment.

Read More

Topics: PKI, Cyber Security

Recent Posts

Posts by Topic

see all

Subscribe to Email Updates

Want to Learn more about CSS?