Insights and Outlooks from the Digital Identity Market Leader

Aug 12, 2020 10:25:18 AM
SSL certificates automatically identify and authenticate public IP addresses’ by assigning each a public/private keypair attached to the server’s unique domain name. Embedding the domain name in the certificate is essential for id [...]
Aug 11, 2020 9:23:53 AM
Digital certificates (e.g. SSL/TLS, X.509) can be issued and managed through many different tools in your DevOps tool-chain. However, the more tools you have for managing the issuance of these certificates lead to gaps in security [...]
Aug 6, 2020 1:46:40 PM
The role that digital certificates – such as TLS/SSL and code-signing certificates – play to protect your business has reached critical importance.  
Aug 4, 2020 9:22:30 AM
X.509 certificate management involves the processes and procedures for buying, deploying, renewing, and revoking certificates in a network of connected applications, servers, systems, or other network parts. Practically all browse [...]
Jul 30, 2020 10:48:51 AM
Monday morning rolls in, you grab a coffee to start the day. Let’s face it, you’ll need it.  If you’re on the PKI team (or a lonely team of one), keeping up with certificate requests, chasing down application owners, and renewing [...]
Jul 23, 2020 9:38:22 AM
PKI deployments have evolved and expanded to protect more business-critical infrastructure and applications than ever before, emerging as a secure and cost-effective technology to enable new initiatives like cloud, service mesh, a [...]
Jul 22, 2020 9:30:01 AM
The midyear point is always an important milestone for Keyfactor and for me personally. It's a time to pause, take stock and reflect on what's worked well and how we can make the most of the rest of the year.
Jul 20, 2020 5:01:58 PM
When it comes to protecting IoT deployments with a secure root of trust, there are some common challenges IoT designers, developers and implementation engineers face.
Jul 16, 2020 12:21:15 PM
TLS certificates serve many purposes. Primarily, they enable encrypted sessions between clients and the websites and prove that the site is not a malicious imposer. A good security practice is to renew key pairs frequently, which [...]
Jul 9, 2020 1:42:47 PM
Public key cryptography, also called asymmetric encryption, is based on computations that are almost impossible to break using today's fastest computers. But, there is still one problem when using encryption with private and publi [...]
Jul 1, 2020 9:02:23 AM
An X.509 certificate is a vital safeguard against malicious network impersonators. Without x.509 server authentication, man-in-the-middle attacks can be initiated by malicious access points, compromised routers, etc.  
Jun 29, 2020 2:32:13 PM
Over the years, the definition, functionality, and team required to operate a modern PKI infrastructure has drastically changed.
Jun 19, 2020 10:52:40 AM
Postbank, the banking division of South Africa’s Pat Office, recently reported that a rogue employee had stolen the 36-digit master keys used to protect the banks systems.  The result: 25,000 fraudulent charges valued at 56 millio [...]
Jun 18, 2020 11:55:09 AM
Public Key Infrastructure (PKI) governs the issuance of digital certificates to protect sensitive data, provide unique digital identities for users, devices and applications and secure end-to-end communications.
Jun 17, 2020 2:04:12 PM
Most people today are familiar with the basic idea of cryptography -- encrypting a message to secure it so that it’s not readable to anyone and everyone.
Jun 15, 2020 12:14:40 PM
No one is denying the need for high levels of security in today’s enterprise. Security has been a top priority for a long time and will continue to remain one for the foreseeable future. 
Jun 12, 2020 3:02:22 PM
Enterprises today run on applications, but keeping those applications up and running is a constant challenge, not to mention the task of securing them.  
Jun 9, 2020 3:24:04 PM
This article is for anyone who seeks a better understanding of SSL certificates, and how they provide security for both Public Internet and Enterprise Intranet connections. 
Jun 9, 2020 12:18:28 PM
When it comes to preparing your security for life’s unexpected circumstances—whether it’s a breach, failed audit, or a global pandemic forcing your business to figure out how to scale PKI remotely—some situations may seem easier t [...]
Jun 8, 2020 9:38:58 AM
The world of IoT has continued to rapidly expand, and as product innovators bring connected devices to market, the risk of device hacks and data theft continue to rise. Faster product development and feature delivery often take pr [...]
Jun 4, 2020 12:16:48 PM
For all the gaps that exist between DevOps and security teams as enterprises try to balance speed of development and security simultaneously, there’s one thing that can bring these two teams together: the fight to stop disruptive [...]
Jun 3, 2020 1:58:54 PM
Before diving into the many benefits and uses of SSL Certificates, it may be helpful to understand the underpinning technology. This article provides a brief history lesson on how Secure Socket Layer (SSL) has evolved into Transpo [...]
Jun 2, 2020 12:19:27 PM
In my 15+ years working with PKI and TLS certificates, never has there been so much news about the importance of managing and protecting digital identities. From the recent Microsoft Teams outage to the recent revocation of 3 mill [...]
May 20, 2020 12:17:56 PM
      When it comes to finding the right resources to stand up and manage your PKI, you’re going to need a team or tool that provides the highest level of expertise and oversight possible.
May 19, 2020 11:38:04 AM
Most organizations, regardless of any size, lean towards having an in-house PKI. By all measurements, their PKI stays secure with hardware security modules and has well-defined certificate policies. There's a larger group of organ [...]
May 14, 2020 12:29:38 PM
      The rapid pace of DevOps has greatly contributed to the growth in cloud adoption and deployments. Consequently, the role of public key infrastructure (PKI) has also expanded across a growing ecosystem of tools and applicatio [...]
May 7, 2020 11:30:01 AM
We have conversations with device manufacturers every day around how to develop an overall IoT device security architecture for their current product lines and future product lines. Ideally, this strategy has the proper level secu [...]
Apr 22, 2020 11:34:08 AM
It’s no secret that Internet-connected devices need security to protect data – and the device itself – from compromise. However, in many cases, IoT products are not engineered with sufficient security to defend against today’s thr [...]
Apr 17, 2020 1:40:28 PM
This week PwC released a survey exploring the financial measures CFOs are evaluating to manage business impact through the COVID-19 crisis and beyond. The reality is that as the economic stall persists, every business will look at [...]
Apr 16, 2020 12:56:42 PM
Managing PKI today is hard work. Spreadsheets or homegrown tools may have brought you this far, but times have changed. Between the need for round-the-clock certificate requests and renewals, regular compliance audits, and chasing [...]
Apr 2, 2020 12:15:32 PM
Over the past few weeks, we’ve received a number of inquiries from executives and practitioners about how best to address the challenges of business continuity emerging with the COVID-19 pandemic, and the need to quickly secure a [...]
Mar 26, 2020 11:09:04 AM
There’s a lot of connected devices out there. That may seem like an obvious statement given that everyone seems to be walking around with a mobile phone, tablet, computer, and wireless headset. But what about all the devices that [...]
Mar 20, 2020 5:17:22 PM
Today marks the end of Keyfactor’s first week working from home as an entire company. Reflecting on these past five days in Keyfactor’s transition to a 100% remote workforce, I can’t help but feel honored to work with such an agil [...]
Mar 18, 2020 5:34:54 PM
Would it be surprising to know that over 74% of organizations don’t even know how many keys and certificates they have, much less, where they are or when they expire? A recent industry report  highlighted this eye-opening statisti [...]
Mar 13, 2020 1:13:09 PM
The Coronavirus (COVID-19) has introduced us to unprecedented circumstances at home and around the world. We’re managing a shifting situation that’s impacting every area of our employees’ daily life, the way they work, and where t [...]
Feb 28, 2020 8:57:59 AM
Across today’s IT landscape, every team needs constant access to IT services and infrastructure to move fast without disruption. This has created a pressing need to effectively manage all of the components that make up an organiza [...]
Feb 27, 2020 10:04:35 AM
This blog features insights from Keyfactor’s Chief Security Officer, Chris Hickman on the 2020 Keyfactor-Ponemon Institute Report: The Impact of Unsecured Digital Identities. Click Here to download and access the full report. In t [...]
Feb 20, 2020 4:39:10 PM
This blog features insights from Keyfactor’s Chief Security Officer, Chris Hickman on the 2020 Keyfactor-Ponemon Institute Report: The Impact of Unsecured Digital Identities. Click Here to download and access the full report. As C [...]
Feb 12, 2020 9:47:33 AM
This blog features insights from Keyfactor’s Chief Security Officer, Chris Hickman on the 2020 Keyfactor-Ponemon Institute Report: The Impact of Unsecured Digital Identities. Click Here to download and access the full report. Publ [...]
Jan 23, 2020 8:00:00 AM
This blog is co-written with Robert Masterson from Thales “Doing DevOps” does not happen overnight – there are stops and starts, wrong turns, and incremental improvements along the way – but there’s no doubt DevOps is making an im [...]
Jan 16, 2020 9:00:36 AM
This blog is co-written with Robert Masterson from Thales The shift toward cloud-native applications is changing the building blocks of IT. Development and maintenance of infrastructure and applications in-house just isn’t an opti [...]
Jan 14, 2020 8:36:50 AM
This blog is co-written with Robert Masterson from Thales In today’s development environment, it’s important for every organization to utilize code signing as a way to ensure that the applications and updates they deliver to end u [...]
Jan 8, 2020 8:00:00 AM
Organizations of all sizes have embraced digital transformation to unlock new lines of revenue, operate more efficiently, and deliver quality products and services faster than ever. New compute platforms and development practices [...]
Dec 19, 2019 9:39:10 AM
In the Factoring RSA Keys in the IoT Era research report, we showed that many of the IoT and network devices in use today are leveraging weak digital certificates that could expose them to attack.  
Dec 18, 2019 8:00:00 AM
As VP of Software Development at Keyfactor, it’s my job to speak with candidates and newly hired engineers as they join the ranks of our growing team (Quick plug: you can always check out our site for open positions). But I’m not [...]
Dec 5, 2019 1:18:48 PM
The Internet of Things (IoT) – besides the ambiguous buzzword – is generally used to describe a trend toward devices becoming more connected, particularly non-traditional devices like household appliances, connected cars, industri [...]
Nov 26, 2019 9:00:00 AM
Privilege, in the IT world, carries a lot of weight and an equally heavy risk. IT and security teams are responsible for keeping the business moving and secure – but to do this, they need access to critical systems and processes.
Nov 20, 2019 9:01:20 AM
After more than 20 years of working hands-on with public key infrastructure (PKI), few things ring truer than this: PKI may be complex to begin with, but the real challenge is finding the right resources and expertise to keep it r [...]
Nov 19, 2019 7:00:00 AM
Today, we’re introducing significant updates and improvements to Keyfactor Command. If you’re not familiar, Keyfactor Command is the world’s most complete and scalable cloud PKI as-a-service and certificate lifecycle automation pl [...]
Nov 13, 2019 8:00:00 AM
Beyond the buzzword, Agile refers to a now-popular approach to project management, typically used in software development. Why does it matter? Because building software is unpredictable, so using the traditional “waterfall” approa [...]
Nov 7, 2019 8:00:00 AM
Organizations of all sizes are up against a battle between the demand to enable new applications and data and the need to protect their business and consumers. If you’re an IT or security professional, you know this all too well. [...]
Oct 28, 2019 10:57:40 AM
Welcome back to part two of a blog series on how to migrate from your legacy PKI solution to the Keyfactor Command platform. In part one, we reviewed the first step in making the switch to a new PKI solution – importing your keys [...]
Oct 22, 2019 9:31:45 AM
IT leaders and managers familiar with Public Key Infrastructure (PKI) recognize it as one of the industry’s oldest tried and tested security tools. IT pros also recognize the cost and dedicated resources required to stand up and m [...]
Oct 16, 2019 2:56:18 PM
Public Key Infrastructure (PKI) is a battle-tested tool that has emerged as a critical, security component for enterprises in all industries. Attackers are constantly seeking the easiest path to network access and a rise in certif [...]
Oct 15, 2019 8:40:26 AM
Let’s set the stage. Today, PKI deployments initially built for one or two applications – things like SSL certificates and device authentication – are now expected to cover more users and devices than ever before. Demand for encry [...]
Oct 1, 2019 9:15:00 AM
In any enterprise there are tens of thousands, if not hundreds of thousands, of digital certificates in use to protect things like web servers through device authentication and data encryption. At this scale, it may seem like a ne [...]
Sep 16, 2019 1:52:28 PM
One of the most common questions we hear at Keyfactor is, “how do I make the certificate renewal process easier for certificate owners?” Even with certificate management software in place, certificate owners still need to monitor [...]
Sep 12, 2019 8:30:00 AM
Is it just me, or does it seem like the occurrence of security breaches is becoming more prevalent these days?  One of the most recent that popped up in my inbox involved  Capital One, where a hacker was able to access about 100 m [...]
Aug 22, 2019 8:50:25 AM
Adoption of the cloud and “as a service” IT has changed the way we do business. While there was once a time when migrating infrastructure and applications to the cloud triggered fear and doubt. Those days of uncertainty are over. [...]
Aug 14, 2019 1:22:11 PM
Hackers might grab the headlines, but there’s a much less sexy, yet equally serious threat to your business: outages. According to the latest report by Ponemon, 74% of organizations still experience unplanned downtime and outages [...]
Aug 14, 2019 8:00:00 AM
Medical devices require regular software and firmware updates to ensure the integrity of the data and the device itself. On the development side, lifecycle management that tracks cryptographic code updates is critical to ensure a [...]
Aug 7, 2019 7:46:00 AM
This article originally appeared on Security Boulevard. Click the link below for the full version.
Jul 29, 2019 9:18:02 AM
The Internet of Medical Things (IoMT) is often heralded as the future of healthcare delivery. It’s not entirely true. Fact is, big data and connected devices are already deeply entrenched in thousands of hospitals, labs, and healt [...]
Jul 24, 2019 8:30:00 AM
This article originally appeared on Software Development Times. Click the link below for the full version.
Jul 22, 2019 2:40:00 PM
This article originally appeared on Crain's Cleveland Business. Click the link below for the full version. For software in development at Keyfactor, lives literally are on the line.
Jul 18, 2019 10:44:00 AM
One of the more recent trends I have seen at Keyfactor are clients coming to us looking for guidance on how to sunset their existing public key infrastructure (PKI) management suite for an improved solution. From mediocre support [...]
Jul 12, 2019 11:20:46 AM
This article originally appeared on Healthcare Info Security. Click the link below for the full version.
Jul 5, 2019 8:26:00 AM
Code signing cyber-attacks like the ASUS hack are on the rise. Attackers continually evolve the toolkits they use to infiltrate business networks. In the case of code signing operations attacks, hackers exploit vulnerable certific [...]
Jul 3, 2019 8:00:00 AM
This article originally appeared on Crain's Cleveland Business. Click the link below for the full version.
Jun 28, 2019 9:15:55 AM
What if an emergency room doctor doesn’t have access to a patient’s medical records?
Jun 27, 2019 1:59:16 PM
We live in a world that runs on code. Software is everywhere. It’s in your home, your car, your workplace, and virtually anywhere you go – all powered by billions of lines of code.
Jun 20, 2019 2:37:00 PM
Keyfactor has always been a little bit different. Headquartered in Cleveland, we care for our customers in a way befitting our Midwestern roots. We play the long game when it comes to product innovation, rather than chase trends. [...]
Jun 11, 2019 2:23:33 PM
Last October, the Food and Drug Administration (FDA) issued an update to Guidance on Content of Premarket Submission for Management of Cybersecurity in Medical Devices – initially drafted in 2014. The guidance applies to medical d [...]
May 28, 2019 9:49:12 AM
This article originally appeared on Info Security Magazine. Click the link below for the full version. With code signing cyber-attacks on the rise, certificate legitimacy is a growing concern. Digital certificates are a core tenet [...]
May 14, 2019 8:30:00 AM
This article originally appeared on Smart Industry. Click the link below for the full version.
May 10, 2019 10:28:21 AM
"If the DBIR were a bottle of decent Scotch Whiskey it would cost you around 100 bucks, instead of being free like this document. Likewise, the decisions you might make after finishing them would probably differ wildly as well. Ne [...]
May 9, 2019 2:01:37 PM
Only a few years ago, hospitals and clinics began to accelerate their transition from paper-based to electronic health records (EHR). Fast forward to today and virtually every aspect of patient care has been digitally transformed. [...]
May 2, 2019 9:35:19 AM
This article originally appeared on Security Magazine. Click the link below for the full version.
Apr 24, 2019 2:00:19 PM
Healthcare is an enormous ecosystem that is growing and changing across every facet of practice. Behind this transformation is the acceleration of digital Internet of Medical Things (IoMT) technologies that enable better delivery [...]
Apr 23, 2019 12:41:35 PM
If you’re a PKI team – often a lonely team of one – you’ve got everything on the line, but often don’t have the resources.
Apr 18, 2019 2:00:00 PM
Insights from Chief Security Officer, Chris Hickman, on the 2019 Keyfactor-Ponemon Institute Report: The Impact of Unsecured Digital Identities
Apr 15, 2019 7:53:50 AM
Innovation never stops and neither do we. Spring is here and the Keyfactor team is excited to announce the launch of our latest release – Keyfactor 6.
Apr 9, 2019 10:10:17 AM
“Trust no one” – a phrase reminiscent of The X-Files – is now a familiar concept in the realm of cybersecurity.
Apr 4, 2019 9:44:14 AM
Innovation in the medical community is constant. New devices and emerging technologies move through the complex development & approval process with next-gen releases top-of-mind. Whether it’s wearables, implanted devices or electr [...]
Mar 29, 2019 4:18:54 PM
This article originally appeared on IoT Agenda. Click the link below for the full version.
Mar 27, 2019 5:34:54 PM
For many of us in IT and system administration, the recent digital security misstep by GoDaddy, Google and Apple undoubtedly hits home. Every story like this gives us at least one lesson to think about. In this case, it’s recogniz [...]
Mar 27, 2019 8:13:00 AM
This article originally appeared on Inside Digital Health. Click the link below for the full version.
Mar 26, 2019 5:24:18 PM
“We saw the updates come down from the Live Update ASUS server. They were trojanized, or malicious updates, and they were signed by ASUS,” said Liam O’Murchu, director of development for the Security Technology and Response group [...]
Mar 15, 2019 9:44:03 AM
One million misissued certificates from only three companies is likely just the tip of the iceberg - there are probably millions more that haven't been disclosed yet and GoDaddy, Google and Apple aren't the only ones that use EJBC [...]
Mar 14, 2019 9:00:00 AM
Insights from Chief Security Officer, Chris Hickman, on the 2019 Keyfactor-Ponemon Institute Report: The Impact of Unsecured Digital Identities
Mar 11, 2019 10:07:28 AM
Medical device manufacturers (MDMs) face pressures from many stakeholders -- shareholders, government agencies, healthcare delivery organizations (HDOs), electronic health records (EHRs), insurance providers, and of course patient [...]
Mar 6, 2019 9:21:15 PM
This article originally appeared on Chief Executive. Click the link below for the full version.
Feb 27, 2019 11:38:09 AM
Insights from Chief Security Officer, Chris Hickman, on the 2019 Keyfactor-Ponemon Institute Report: The Impact of Unsecured Digital Identities
Feb 21, 2019 12:03:00 PM
If you had the opportunity to attend the 2019 HIMSS Conference last week, you were probably made keenly aware by vendors, speakers, and exhibitors of the growing interest of cybersecurity in healthcare. The healthcare statistic is [...]
Feb 19, 2019 10:05:30 AM
This article originally appeared on TotalRetail. Click the link below for the full version.
Feb 14, 2019 10:00:00 AM
Highlights from the 2019 Keyfactor-Ponemon Institute Report: The Impact of Unsecured Digital Identities
Feb 13, 2019 12:00:25 AM
It’s no secret that the healthcare industry is an ideal target for cyber criminals. Digital transformations are underway; the value of the data is immense; and while breaches in healthcare are generally higher than other industrie [...]
Jan 31, 2019 12:11:24 PM
This article originally appeared on IT Toolbox. Click the link below for the full version.
Jan 23, 2019 3:45:21 PM
Over the past several months there have been several reports showing that healthcare breaches are not just an external problem to tackle. Internal threats are real and growing, playing an increasing role in how HDOs and EHRs asses [...]
Jan 22, 2019 2:27:13 PM
This article originally appeared on PitchBook. Click the link below for the full version.
Jan 17, 2019 2:55:05 PM
From PII to financial information to the threat of device takeovers, healthcare breaches are on the rise and organizations are working hard to keep up. The U.S. Department of Health and Human Services tracks breaches in healthcare [...]
Jan 8, 2019 1:58:46 PM
We often get questions around how to apply policies that allow CAs to only issue specific types of certificates or certificates that can only be used in very specific use cases. An increasingly popular ask is around how to restric [...]
Jan 4, 2019 11:30:50 AM
This article originally appeared on ReadWrite. Click the link below for the full version. Very few data breaches have garnered as much attention recently as the Starwood/Marriott breach in which up to 500 million records may have [...]
Dec 18, 2018 8:11:00 AM
After May 1, 2019, any public certificates with underscore characters will be revoked. Will your certificates comply? On November 10, 2018, the Certification Authority Browser Forum (CA/B) passed Ballot SC12 which will end the use [...]
Dec 17, 2018 2:14:39 PM
This article originally appeared on TechTarget's IoT Agenda blog. Click the link below for the full version. After years of embarrassing breaches and botnet abuses, IoT device manufacturers are finally realizing what consumers are [...]
Dec 13, 2018 3:54:24 PM
With the end of the year approaching, it’s a perfect time to look at what’s ahead for enterprise cybersecurity in 2019. As data breaches continue to pose security threats across every industry, planning for operational enhancement [...]
Dec 13, 2018 8:00:00 AM
This article originally appeared on the Forbes Technology Technology Council blog. Click the link below for the full version. Imagine that, for whatever reason, you hear you’re the target of an elite cyber-mafia. You don’t take it [...]
Dec 10, 2018 12:49:14 PM
  This article originally appeared on the Retail TouchPoints blog. Click the link below for the full version. As the retail industry gets underway for this year’s holiday season, it’s expected that hackers will follow suit. In fac [...]
Dec 3, 2018 3:04:18 PM
“We fell short of what our guests deserve and what we expect of ourselves. We are doing everything we can to support our guests, and using lessons learned to be better moving forward.”   Arne Sorenson, Marriott’s President and Chi [...]
Nov 29, 2018 2:00:49 PM
Q&A with Kevin von Keyserling (KvK), Keyfactor CEO and co-founder and Mark B. Cooper, aka The PKI Guy, from PKI Solutions.
Nov 19, 2018 3:49:33 PM
Since the beginning of the company, caring passionately about our service promise to our clients had been a hallmark of Certified Security Solutions (CSS) -- that's a big part of what made us successful for more than 15 years, sec [...]
Oct 26, 2018 10:45:13 AM
This article originally appeared in Healthcare Analytics News. Click the link below for the full version. The U.S. Food and Drug Administration’s recently released guidelines on medical device security serve as a framework for hea [...]
Oct 24, 2018 11:00:19 PM
Without always thinking about it, patients willingly share Personally Identifiable Information (PII) destined to live in electronic health records (EHRs) with their trusted healthcare providers. Maintaining this data is an immense [...]
Oct 5, 2018 9:51:51 AM
As the Internet of Things (IoT) continues to grow and expand into new industries, there remains a gap between device manufacturing and security. Security is often an afterthought, and viewed as something that can be added to the d [...]
Oct 5, 2018 9:48:16 AM
With cyber crime damage costs estimated to hit $6 trillion annually by 2021, there’s no doubt that cybersecurity continues to be one of the top concerns for IT departments in every industry. They’re constantly in search of more ro [...]
Sep 21, 2018 12:10:20 PM
Companies of every size have been tending to digital security for decades. What at one time may have been thought of as comprehensive coverage, is now just enough to keep the lights on. As the number of connected people, applicati [...]
Aug 17, 2018 1:15:41 PM
Public Key Infrastructure (PKI) supports digital certificates and their associated keys to verify the identity of users and devices to other users, devices and applications. As such, PKI is paramount to network and Internet securi [...]
Aug 13, 2018 4:05:25 PM
There are many benefits to the automation of container deployment, but these benefits do not come without their complications. The DevOps efforts have made hard coding credentials into cloud-init scripts common practice, but this [...]
Aug 13, 2018 3:42:07 PM
Clients commonly ask us how to use our PKI and digital certificate operations management platform, Keyfactor Command, to manage application certificates in a DevOps environment. They are “containerizing” their applications with Do [...]
Aug 6, 2018 3:20:50 PM
 In an evolving cyber security landscape, defenses must continually evolve. Static systems are not only inherently insecure, they are less so with each passing day. This principle applies to cryptography as much as to other types [...]
Jul 30, 2018 9:49:15 AM
Something is wrong in the broader Enterprise cyber security landscape. As a whole, organizations are devoting growing sums of cash to thwart cyber criminals. In 2018, international cyber security spending could reach $96 billion, [...]
Jun 14, 2018 3:17:40 PM
There are clear parallels between home ownership and cyber security. Locked windows and doors as well as household alarms have cyber-analogs, of course, and are often used to help illustrate the importance of technologies such as [...]
Jun 4, 2018 3:42:44 PM
Gambling means being prepared to lose everything. When working with an out of control, unmanaged digital certificate count and public key infrastructure (PKI), the risks of facing issues with financial and productivity losses are [...]
May 8, 2018 11:17:54 AM
Of all of the connected devices blackhat hackers could go after, why would they target medical devices? While there are a plethora of motives, most involve financial gain. Cybercriminals targeting medical devices are willing to pu [...]
Apr 25, 2018 3:19:42 PM
Imagine a world with no access controls. A free for all resulting in chaos thanks to broken processes, zero audit trails, and no way to administer rights to the appropriate devices or people. Luckily, today’s IoT driven world is l [...]
Apr 17, 2018 12:00:00 AM
This week, CSS announced the first mass-market implementation of a quantum-resistant Certificate Authority (CA). The result of a fruitful partnership with ISARA, this project possesses a high "coolness factor."  We've been excited [...]
Apr 11, 2018 2:04:16 PM
The General Data Protection Regulation (GDPR) is here.  Enforceable effective May 25, 2018, the GDPR aims to address data protection and privacy rights for citizens of the European Union. GDPR addresses two primary areas of concer [...]
Apr 6, 2018 11:33:57 AM
The demand for trust in today's uber-connected digital society is unprecedented. Consumers of software require guaranteed proof that the application they are using is legitimate. Secure code signing validates the author of the sof [...]
Apr 3, 2018 9:04:15 AM
Death, Taxes, and Weakening Cryptography "Nothing is certain except death and taxes." Ben Franklin is often credited with coining this phrase; however, the first known appearance of "death and taxes" in this usage came from a play [...]
Mar 30, 2018 2:40:07 PM
Overwhelmed by manual Public Key Infrastructure (PKI) & certificate management processes? Burdened with worry of rogue certificates or certificate-related outages? Worried you've lost all control of your PKI? Stop losing and start [...]
Mar 23, 2018 10:05:44 AM
What is a Managed PKI? - Your PKI, Our Management and Service CMS Sapphire™ professionally managed Public Key Infrastructure (PKI) from Certified Security Solutions (CSS) allows you to maintain complete control over the use of you [...]
Mar 1, 2018 4:52:41 PM
Chrome 58 Patch Stirs up Controversy and Commotion A few short months ago Google released a patch (v.58) on its widely used Chrome browser. This patch being released forced us all to question the way we are doing certificate issua [...]
Feb 23, 2018 10:47:23 AM
A good API makes the difference between a software application and a software platform. Without an API, a software product is a special-purpose tool for a pre-defined set of specific operations. With a good API, though, it can bec [...]
Feb 16, 2018 4:22:58 PM
We Can All Move IoT Security Forward Industry groups such as the National Institute of Standards and Technology (NIST), the Industrial Internet Consortium (IIC), and the IoT Security Foundation (IoTSF), are developing security fra [...]
Feb 16, 2018 3:40:58 PM
Reporting requests can go on forever, and most software provides the ability to create and deliver reports via an integrated reporting tool. While making reporting easy for third-party vendors, usually this limits customer flexibi [...]
Feb 13, 2018 4:10:59 PM
With CMS 5.0, modernizing the user interface (UI) and improving the user experience was a top priority. The UI pre-5.0 was effective, however CSS has grown as a company and product since, and our UI now reflects our growth in this [...]
Feb 8, 2018 10:47:39 PM
At CSS we are all about helping clients manage their Public Key Infrastructure (PKI). We always recommend that customers store their important private keys using Hardware Security Modules (HSMs) because without an HSM it is hard t [...]
Jan 5, 2018 11:32:34 AM
As with any new year, there are with plenty of expectations and predictions.  There is nothing different about this year.  Especially as it relates to the Internet of Things (IoT). With over 20 billion current “connected” devices [...]
Jan 3, 2018 9:28:16 PM
At CSS we are all about helping our customers manage their Public Key Infrastructure (PKI). We always recommend that customers store their important private keys using Hardware Security Modules (HSMs) because without an HSM it is [...]
Dec 7, 2017 9:39:19 AM
When it comes to connected devices, how big should your "Circle of Trust" be?  Who should you trust, and why? As told by Jack Byrnes ("Meet the Parents"), who should you trust and why?
Oct 26, 2017 10:31:28 PM
While conventional wisdom of those who don't trust the cloud has been that on premises is more secure, the important reality is that on premises is only more secure if you have the expertise and you are willing to allocate your ex [...]
Oct 25, 2017 8:50:36 AM
  There are always questions in regard to why an organization should care about their digital certificate lifecycle management (CLM) with their existing public key infrastructure (PKI).  Our sales team constantly hears the same re [...]
Oct 11, 2017 11:47:25 AM
Although Halloween happens once a year, evil lurks in the digital IoT world all year round.  Systems must be protected 24/7/365 to ensure that the ‘Demogorgon’ does not make it’s way through the portal into the system.  One concer [...]
Oct 6, 2017 10:28:43 AM
If you're not watching your PKI...who is?  As ominous as the title sounds, this blog will actually focus on the parties that should have eyes on your public key infrastructure (PKI), rather than the “bad actors” who shouldn’t.  Th [...]
Oct 2, 2017 10:59:00 PM
Last week, a bipartisan group from the US Senate Cybersecurity Caucus proposed a new piece of legislation called the “Internet of Things Cybersecurity Improvement Act of 2017.”  While the bill has yet to be ratified, it places mor [...]
Sep 13, 2017 10:35:59 AM
Why do I care about cryptography as an IoT architect? What is the deal with cryptography? Why does cryptography matter in the IoT world? Currently, it is estimated that there are about 8.4 billion devices online.  Within the next [...]
Sep 7, 2017 11:40:56 AM
Symantec SSL Customers, do you know where your certificates are located? In March, Google announced they discovered a problem with Symantec issued SSL certificates. Google identified roughly 30,000 SSL certificates that violated i [...]
Aug 16, 2017 11:26:40 AM
Do you remember the movie E.T, where E.T is essentially stranded on Earth until he assembles a makeshift communication device which sends a message to his spaceship to return to earth to retrieve him?
Aug 15, 2017 12:46:02 PM
CMS Enterprise now provides exclusive, real time policy control at the Certificate Authority (CA), providing the most comprehensive security compliance for certificate issuance available today. The CMS Custom Policy Modules interc [...]
Aug 10, 2017 3:41:43 PM
The quandary in buying a solution to any business problem is am I making the best choice and will our company derive value from that selection? In representing a variety of solutions to customers over more than 35 years, I have fo [...]
Aug 7, 2017 3:34:16 PM
Last week, a bipartisan group from the US Senate Cybersecurity Caucus proposed a new piece of legislation called the “Internet of Things Cybersecurity Improvement Act of 2017.”  While the bill has yet to be ratified, it places mor [...]
Jun 27, 2017 9:24:02 AM
My alarm signals like an acoustic guitar. I really need to change that sound – it’s starting to get on my nerves. A quick email scan before I begin my morning routine. Justin was finally able to get the domain joined machines in t [...]
Jun 22, 2017 1:03:04 PM
The average global 5,000 company spends about $15 million to recover from a certificate outage. These estimates are based on a Ponemon survey of about 2,400 global respondents which include remediation costs, loss of productivity, [...]
Jun 14, 2017 11:04:00 PM
As CTO at Certified Security Solutions, I’ve been asked the question more and more lately, “how will Blockchain impact PKI?”   There’s so much mysticism around Blockchain technology today that it can become difficult to separate t [...]
Jun 2, 2017 1:40:54 PM
Trends in Encryption and Data Security Include Major Implications for the IoT Key Trends of the 2017 Thales Data Threat Report The Global Edition of the 2017 Thales Data Threat Report featured a number of trends in the data set wh [...]
May 19, 2017 1:59:29 PM
Congratulations, you’ve chosen ThingWorx to launch and manage your IoT devices, applications and data. Your goals are clear, your code has been tested and the connections are ready to engage. Unfortunately, you’ve forgotten a crit [...]
May 18, 2017 8:49:05 AM
As CTO at Certified Security Solutions, I’ve been asked the question more and more lately, “how will Blockchain impact PKI?”   There’s so much mysticism around Blockchain technology today that it can become difficult to separate t [...]
May 5, 2017 2:02:23 PM
With Google’s recent Chrome 58 version update, your Public Key Infrastructure (PKI) may suddenly be impacted. Your formerly-compliant HTTPS certificates may no longer be working. CSS is here to explain what has changed, why has it [...]
Mar 27, 2017 4:17:51 PM
Despite the documented shortcomings of the Simple Certificate Enrollment Protocol (SCEP), it is still in widespread use today. This is in large part due to the lack of better options when it comes to certificate enrollment – espec [...]
Mar 22, 2017 11:41:01 AM
SHA-1 has been in the news (again). We’ve all known that the SHA-1 hash function is cryptographically weak. In fact, CSS has been pointing out the weaknesses of SHA-1 for years now. Time's Up for SHA-1, CSS' Suggested Migration Pa [...]
Feb 9, 2017 3:06:59 PM
Planning on attending RSA 2017? Connect with CSS! Are You Attending RSA 2017? Connect with the Cyber Security Experts at Certified Security Solutions Certified Security Solutions (CSS) will be attending the 2017 RSA Conference in [...]
Feb 3, 2017 10:25:33 AM
Cyber Threats to Aerospace and Defense  Cyber Threat Conditions in Aerospace and Defense   As one can imagine, the aerospace and defense industry is full of highly sensitive data. When you consider their primary customers, namely [...]
Feb 1, 2017 10:52:00 PM
The healthcare sector continues to build some of the largest, lucrative and vulnerable stores of data, making them attractive targets for cyber criminals. Further, malicious actors are more prevalent, organized and creative in the [...]
Jan 26, 2017 7:17:12 PM
Evolving Challenges of Cyber Security in Telecommunications The Telecom Threat Environment For the telecommunications sector, staying up-to-speed with information security challenges is a constant battle. Telecom organizations are [...]
Jan 12, 2017 4:14:29 PM
Manufacturing is Contending with a Changing Risk Environment An Overview of Cyber Threats to Manufacturing Manufacturing is a widespread industry with a lot of components. Mass production, purchasing, selling, and the information [...]
Jan 5, 2017 4:01:19 PM
CSS Presents Cyber Security Survey Results   A National Digital Identity Insights Survey In Q4 2016, CSS Research surveyed information security professionals on their current and anticipated public key infrastructure (PKI) usage, [...]
Dec 22, 2016 3:52:35 PM
How Properly Managing Digital Certificates Enhances Your Security Posture Digital Certificate Management and Cyber Security Today Cryptography itself has been around for a while; what’s interesting is how it’s evolved over time. T [...]
Dec 16, 2016 1:41:13 PM
Facing the Cybersecurity Challenges of the Retail Sector Retail’s Cyber Threat Environment: Debit Cards, Credit Cards, and Surviving as a Popular Target The Internet, technological evolution, and the “always on, always connected” [...]
Dec 12, 2016 11:40:51 AM
CSS Presents PKI Promises for the Security of Next Year Making 2017 Your Business’ Most Secure Year 2016 was an eventful year for cyber security, from beginning to end. While longstanding security problems remained challenging, ma [...]
Dec 5, 2016 3:29:01 PM
How Are Achieving Cyber Security Compliance and a Truly Secure State Different? Achieving Compliance is Not Equivalent to Achieving an Actual Secure State The backdrop of today’s information security landscape is riddled with dema [...]
Nov 28, 2016 2:06:17 PM
Fog Computing: When the Cloud is Not Enough How Do We Manage the Massive Amounts of Data Generated by the IoT? The Internet of Things (IoT) market and its exponential growth are bringing many improvements and considerable revenue [...]
Nov 20, 2016 10:19:13 PM
The Explosion of Cloud-based Apps and the IoT are Creating the Need to Reinforce PKI Environments  The takeover of the cloud has brought countless businesses to pursue cloud migration over the past few years in an effort to take a [...]
Nov 17, 2016 2:19:26 PM
The World of PKI and IoT in 2017 In 2017, Public Key Infrastructure (PKI) will continue to solidify its place as a fundamental digital identification, authentication and encryption standard—especially as the Internet of Things (Io [...]
Nov 11, 2016 2:33:40 PM
PKI and Digital Certificates as a Solution for PCI Compliance Cyber Threats of the Financial Sector Financial services is navigating an interesting time: eight years have passed since the crash of 2008, allowing enough time for ma [...]
Oct 31, 2016 11:26:53 AM
Health checks are critical to maintaining Public Key Infrastructures (PKI) and a strong overall security posture, but they’re overlooked too often.   Public Key Infrastructure (PKI) is Not a “Set and Forget” Scenario It’s common k [...]
Oct 28, 2016 8:56:44 AM
Blockchain Unblocked - What it is and what it is not Blockchain technology has become a topic of major discussion in the past year or two.  There’s no question that the technology holds significant promise for the future… and it’s [...]
Oct 25, 2016 12:00:36 PM
IT and Compliance Departments Working Together With Greater Frequency The Integration between IT and Compliance Presently, a marked shift from the silos of IT and compliance teams is resulting in a departmental convergence for man [...]
Oct 20, 2016 1:24:39 PM
How Can the Energy Sector Protect Itself From Cyber Threats? The Takeover of Network-Connected Sensors in the Energy Industry The problems of the energy sector, including increasing conservation efforts, greater emphasis on altern [...]
Oct 18, 2016 8:50:41 AM
Are You Ready for the Move to SHA-2? Is your business ready for SHA-1 deprecation? The timelines for the move to SHA-2 are looming, and deprecation is fast-approaching. Explained by InfoWorld, SHA-1 was once considered secure, but [...]
Oct 14, 2016 12:39:36 PM
Yesterday (October 13, 2016), certain segments of the Public Key Infrastructue (PKI) world were spun into a frenzy, when a GlobalSign CA certificate appeared to have been revoked.  Clearly, revoking a CA certificate is a significa [...]
Oct 11, 2016 3:28:25 PM
The healthcare sector continues to build some of the largest, lucrative and vulnerable stores of data, making them attractive targets for cyber criminals. Further, malicious actors are more prevalent, organized and creative in the [...]
Oct 11, 2016 3:27:20 PM
The healthcare sector continues to build some of the largest, lucrative and vulnerable stores of data, making them attractive targets for cyber criminals. Further, malicious actors are more prevalent, organized and creative in the [...]
Sep 27, 2016 4:29:04 PM
Your PKI Implementation—What’s Involved? Public key infrastructure (PKI) strict implementation management is not optional—it’s necessary. Whether your organization is in the wireless space, implementing a BYOD initiative, or tackl [...]
Sep 22, 2016 1:55:14 PM
Cybersecurity Today Ever-evolving security challenges are dominating today’s IT landscape. Malicious actors are using every avenue possible to access sensitive and valuable data, from social engineering and DDoS to brute force met [...]
Sep 16, 2016 12:23:53 PM
Those of us in the information security field are all too familiar with the effectiveness of social engineering, and while there are still those who readily send money off to strangers from a simple phone call or email, people are [...]
Sep 8, 2016 9:36:06 AM
PKI is an entire infrastructure supporting trusted certificates As more enterprises implement their own internal Public Key Infrastructure (PKI) to save money on purchasing an increasing volume of digital certificates, the need fo [...]
Aug 31, 2016 9:03:30 AM
Trust, as it pertains to most components within a Public Key Infrastruture (PKI) is earned. It’s established as the result of some sort of evaluation. An evaluation that often involves a revocation check or policy check. In the ca [...]
Aug 1, 2016 3:59:21 PM
In 2016 digital identity cyber crimes have grown exponentially. As businesses continue to brace against cyber adversaries and look to secure the Internet of Things (IoT), Public Key Infrastructure (PKI) is continuing to prove that [...]
Jul 14, 2016 2:32:31 PM
The newly released Pokemon Go by Niantic for mobile devices is all the craze right now. With over 15 million downloads, and 1.6M in daily revenue in the US alone, it has become the most downloaded app of all time. To summarize, th [...]
Jun 21, 2016 3:39:55 PM
In 2016 CSS Research surveyed information security professionals on their current and anticipated digital certificate usage related to enterprise and Internet of Things (IoT) use cases. This infographic outlines key findings from [...]
Jun 15, 2016 11:46:34 AM
Why are we talking about assurance? ‘Assurance’ in the realm of PKI, tends to be one of those topics that is almost guaranteed to send a PKI design meeting down a rabbit hole. And unfortunately, many customers prefer the blue pill [...]
Jun 9, 2016 1:56:24 PM
Jay Thoden van Velzen from SAP recently published a very interesting blog describing the use of certificate metadata as a mechanism to enhance IoT authentication.  We wholeheartedly agree with the approach.  CSS’ VerdeTTo solution [...]
Jun 1, 2016 10:20:24 AM
Having the privilege to work with some of the best, if not the best PKI and security professionals in the field, I have learned the extreme importance of the practices used in securing the root certification authority (CA) platfor [...]
May 11, 2016 9:22:58 AM
Digital identity management (DIM) is the process for managing and securing digital identities through authentication, encryption, and signing. The end goal is to protect your organization’s reputation by preventing breach and/or d [...]
Apr 26, 2016 11:25:11 AM
Healthcare Devices: Then and Now Healthcare devices through the ages: what was once a cumbersome trip to the doctor for testing, followed by a series of manual documentation steps, is now a convenient, internet-connected wearable [...]
Apr 15, 2016 10:51:18 AM
As a Public Key Infrastructure (PKI) best practice, Certificate Policies are associated with a PKI by reserving and incorporating unique object identifiers (OID) into all or portions of your PKI.  OIDs are used to assign one or mo [...]
Apr 6, 2016 9:46:39 AM
This blog is a continuation in a series of blogs, relating to the perils of adding Subject Alternate Name (SAN) information to a certificate signing request (CSR).
Mar 18, 2016 11:12:22 AM
IoT Security: the area of the information security industry aimed at securing devices, data, people and applications within the Internet of things (IoT). What makes IoT Security so important? The growth of internet-connected data, [...]
Feb 19, 2016 12:11:59 PM
  If your organization is managing a significant volume of digital certificates (over 100), and expects continued rapid growth, your security team should consider an automated certificate lifecycle management solution. When facing [...]
Feb 5, 2016 2:36:48 PM
Building custom activities in Forefront Identity Manager (now Microsoft Identity Manager) required an understanding of programming in C# or VB.Net and how Windows Workflow Foundation functions.