PKI Blog

Fog Computing and the IoT

Posted by CSS Technical Team on Nov 28, 2016 2:06:17 PM

Fog Computing: When the Cloud is Not Enough

How Do We Manage the Massive Amounts of Data Generated by the IoT?

The Internet of Things (IoT) market and its exponential growth are bringing many improvements and considerable revenue to almost every conceivable vertical. Now that most industries have a handle on what the IoT is, the public is watching it benefit both consumers and businesses alike. The IoT is generating detailed insights into consumer behavior, thereby improving product design and functionality, and also, according to Cisco, accelerates response to events, which ultimately enhances safety, improves service levels and increases output.

Read More

Topics: embedded certificates, SCEP, X.509 digital certificates, Internet of Things, IoT, PKI for IoT, Fog Computing, Root of Trust, Device Security

The Risks of Cryptographic Anarchy

Posted by Wayne Harris on Jun 15, 2016 11:46:34 AM

Why are we talking about assurance?

‘Assurance’ in the realm of PKI, tends to be one of those topics that is almost guaranteed to send a PKI design meeting down a rabbit hole. And unfortunately, many customers prefer the blue pill, rather than committing to an effort commensurate with a rigorous examination of risk, impact and assurance in the certificate space.

Read More

Topics: PKI, Internet of Things, IoT, PKI CA, IoT Security, PKI for IoT

Why is IoT Security So Critical?

Posted by CSS Technical Team on Mar 18, 2016 11:12:22 AM
IoT Security: the area of the information security industry aimed at securing devices, data, people and applications within the Internet of things (IoT).


What makes IoT Security so important? The growth of internet-connected data, devices, applications and users has exploded exponentially. IoT is carrying over into such a wide array of products and services: mobile devices, wearables, medical devices; everything under the sun can now be connected to the internet.

Read More

Topics: embedded certificates, SCEP, Internet of Things (IoT), IoT Security, PKI for IoT, Root of Trust, Device Security

Giving the Internet an Identity: How to Manage Digital Identities

Posted by CSS Technical Team on Feb 19, 2016 12:11:59 PM

 

If your organization is managing a significant volume of digital certificates (over 100), and expects continued rapid growth, your security team should consider an automated certificate lifecycle management solution.

When facing the responsibility to ensure the health, validity, and expiration dates of a large number of digital certificates, using an Excel spreadsheet is not a scalable or smart option. Letting just one certificate expire can be catastrophic. Having access to a solution that catalogs and monitors each certificate, alerts your team of expirations or issues, and assists in automating the re-issuance of revocation of certificates for the given data, device or application adds a layer of assurance to your security posture as well as satisfies an audit/compliance requirement.

Read More

Topics: digital certificates, Digital Identity Management, PKI for IoT

Posts by Topic

see all

Want to Learn more about CSS?