Of all of the connected devices blackhat hackers could go after, why would they target medical devices? While there are a plethora of motives, most involve financial gain. Cybercriminals targeting medical devices are willing to pu [...]
This week, CSS announced the first mass-market implementation of a quantum-resistant Certificate Authority (CA). The result of a fruitful partnership with ISARA, this project possesses a high "coolness factor." We've been excited [...]
The General Data Protection Regulation (GDPR) is here. Enforceable effective May 25, 2018, the GDPR aims to address data protection and privacy rights for citizens of the European Union. GDPR addresses two primary areas of concer [...]
Death, Taxes, and Weakening Cryptography "Nothing is certain except death and taxes." Ben Franklin is often credited with coining this phrase; however, the first known appearance of "death and taxes" in this usage came from a play [...]
We Can All Move IoT Security Forward Industry groups such as the National Institute of Standards and Technology (NIST), the Industrial Internet Consortium (IIC), and the IoT Security Foundation (IoTSF), are developing security fra [...]
At CSS we are all about helping clients manage their Public Key Infrastructure (PKI). We always recommend that customers store their important private keys using Hardware Security Modules (HSMs) because without an HSM it is hard t [...]
Last week, a bipartisan group from the US Senate Cybersecurity Caucus proposed a new piece of legislation called the “Internet of Things Cybersecurity Improvement Act of 2017.” While the bill has yet to be ratified, it places mor [...]
As CTO at Certified Security Solutions, I’ve been asked the question more and more lately, “how will Blockchain impact PKI?” There’s so much mysticism around Blockchain technology today that it can become difficult to separate t [...]
The healthcare sector continues to build some of the largest, lucrative and vulnerable stores of data, making them attractive targets for cyber criminals. Further, malicious actors are more prevalent, organized and creative in the [...]
As PKI practitioners, we’ve been asked the question for years: “What’s the best way to get a digital certificate on _____?” What gets filled into the blank has expanded dramatically over time, however. Ten years ago, certificates [...]