PKI Blog

How to Regain Control of Compromised IoT Device Certificates

Posted by JD Kilgallin on Apr 25, 2018 3:19:42 PM

Imagine a world with no access controls. A free for all resulting in chaos thanks to broken processes, zero audit trails, and no way to administer rights to the appropriate devices or people. Luckily, today’s IoT driven world is layered with access controls designed to streamline and simplify alongside of prioritizing the most important aspect - security. With CMS VerdeTTo and the VerdeTTo Access Valve for ThingWorx, devices can be constrained to only access systems under certain conditions, such as connecting from certain known locations or during certain expected operating hours. VerdeTTo also allows devices with compromised certificates to quickly be disabled, preventing them from accessing network resources and systems. Just one click changes a metadata value for the compromised certificates through the VerdeTTo portal, while the VerdeTTo Access Valve immediately terminates the device’s access to the ThingWorx platform. But once a device is compromised (especially if a broad range of devices are compromised) how do you securely bring everything back online?

Read More

Topics: Public Key Infrastructure, PKI, IoT, Internet of Things (IoT), LiveWorx, Cryptography

Leveraging Existing Technology for Flexible and Extensible Certificate Reporting

Posted by Jack Palivoda on Feb 16, 2018 3:40:58 PM

Reporting requests can go on forever, and most software provides the ability to create and deliver reports via an integrated reporting tool. While making reporting easy for third-party vendors, usually this limits customer flexibility to extend reporting to meet specific business needs. These new reports require new investments.

Read More

Topics: Certificate Reporting Tool, PKI, Certificate Management System, Microsoft SQL Server, SQL Server Report Server

THE CIRCLE OF TRUST FOR CONNECTED DEVICES

Posted by Anthony Ricci on Dec 7, 2017 9:39:19 AM

When it comes to connected devices, how big should your "Circle of Trust" be?  Who should you trust, and why?

As told by Jack Byrnes ("Meet the Parents"), who should you trust and why?

Read More

Topics: Public Key Infrastructure, PKI, Internet of Things (IoT), Root of Trust, ThingWorx, LiveWorx, Connected Devices

SCARIER THINGS: Protect Your IoT Assets with HSMs

Posted by Anthony Ricci on Oct 11, 2017 11:47:25 AM

Although Halloween happens once a year, evil lurks in the digital IoT world all year round.  Systems must be protected 24/7/365 to ensure that the ‘Demogorgon’ does not make it’s way through the portal into the system.  One concern is the protection of our cryptographic keys.  Although there are many ways to accomplish this, it is not an easy decision.

Read More

Topics: Public Key Infrastructure, PKI, Hardware Security Module, IoT, Internet of Things (IoT), HSM, LiveWorx

Who’s Watching Your Public Key Infrastructure (PKI)?

Posted by Andrew Prayner on Oct 6, 2017 10:28:43 AM

If you're not watching your PKI...who is?

 As ominous as the title sounds, this blog will actually focus on the parties that should have eyes on your public key infrastructure (PKI), rather than the “bad actors” who shouldn’t.  The latter is no less important, however, and that could easily be the topic of a future blog.

Read More

Topics: Managed PKI, Public Key Infrastructure, PKI, DIY PKI

“CAN YOU KEEP A SECRET?” KEEPING YOUR IOT DEVICES SAFE AND SECURE–CRYPTOGRAPHY 101

Posted by Anthony Ricci on Sep 13, 2017 10:35:59 AM

Why do I care about cryptography as an IoT architect? What is the deal with cryptography? Why does cryptography matter in the IoT world?

Currently, it is estimated that there are about 8.4 billion devices online.  Within the next 3 years, the number will be over 20.4 billion devices.  As more connected devices are deployed, there becomes a greater need to control and manage the identity of those devices. There is also a need to protect the devices “data at rest” and “data that is transmitted.” Cryptography gives us a way to do that with high assurance and reliability.

 

Read More

Topics: Public Key Infrastructure, PKI, IoT, Internet of Things (IoT), LiveWorx, Cryptography

You have choices in certificate and PKI management – Why CSS?

Posted by Tom Klein on Aug 10, 2017 3:41:43 PM

The quandary in buying a solution to any business problem is am I making the best choice and will our company derive value from that selection?

In representing a variety of solutions to customers over more than 35 years, I have found a few consistent characteristics of customers that have been happy with their decision.

Read More

Topics: PKI, Public Key Infrastructure (PKI)

How I Lost Control of My PKI

Posted by Ex-PKI Guy on Jun 27, 2017 9:24:02 AM

My alarm signals like an acoustic guitar. I really need to change that sound – it’s starting to get on my nerves. A quick email scan before I begin my morning routine. Justin was finally able to get the domain joined machines in the correct group policy – nice. Next email, a support ticket stating access to the vacation request system was denied. Probably just another user error, I’d get to it later on.

Read More

Topics: Public Key Infrastructure, PKI

The Real Cost of an Expired Digital Certificate

Posted by CSS Technical Team on Jun 22, 2017 1:03:04 PM

The average global 5,000 company spends about $15 million to recover from a certificate outage. These estimates are based on a Ponemon survey of about 2,400 global respondents which include remediation costs, loss of productivity, lost revenues, and brand image damage.

Read More

Topics: digital certificate, Public Key Infrastructure, PKI, Digital Identity Management, Unplanned Outages

CSS to Attend RSA 2017, Featuring CMS Sapphire for PKI-as-a-Service (PKIaaS), CMS VerdeTTo IoT Directory Services, and CMS Topaz for Cloud Apps.

Posted by CSS Technical Team on Feb 9, 2017 3:06:59 PM

Planning on attending RSA 2017? Connect with CSS!

Are You Attending RSA 2017? Connect with the Cyber Security Experts at Certified Security Solutions

Certified Security Solutions (CSS) will be attending the 2017 RSA Conference in San Francisco this February. Our full team will be in attendance, and we’re looking forward to getting to know the information security professionals of the community and interfacing with attendees. We will also be featuring our latest solutions that include CMS Sapphire for PKI-as-a-Service, CMS VerdeTTo IoT Directory Services, and CMS Topaz for Cloud Apps and Application Developers.

Read More

Topics: RSA, PKI, IoT

Recent Posts

Posts by Topic

see all

Subscribe to Email Updates

Want to Learn more about CSS?