Insights and Outlooks from the Digital Identity Market Leader

Apr 17, 2018 12:00:00 AM
This week, CSS announced the first mass-market implementation of a quantum-resistant Certificate Authority (CA). The result of a fruitful partnership with ISARA, this project possesses a high "coolness factor."  We've been excited [...]
Apr 11, 2018 2:04:16 PM
The General Data Protection Regulation (GDPR) is here.  Enforceable effective May 25, 2018, the GDPR aims to address data protection and privacy rights for citizens of the European Union.  GDPR addresses two primary areas of conce [...]
Apr 3, 2018 9:04:15 AM
Death, Taxes, and Weakening Cryptography "Nothing is certain except death and taxes." Ben Franklin is often credited with coining this phrase; however, the first known appearance of "death and taxes" in this usage came from a play [...]
Feb 16, 2018 4:22:58 PM
We Can All Move IoT Security Forward Industry groups such as the National Institute of Standards and Technology (NIST), the Industrial Internet Consortium (IIC), and the IoT Security Foundation (IoTSF), are developing security fra [...]
Feb 8, 2018 10:47:39 PM
At CSS we are all about helping clients manage their Public Key Infrastructure (PKI). We always recommend that customers store their important private keys using Hardware Security Modules (HSMs) because without an HSM it is hard t [...]
Oct 2, 2017 10:59:00 PM
Last week, a bipartisan group from the US Senate Cybersecurity Caucus proposed a new piece of legislation called the “Internet of Things Cybersecurity Improvement Act of 2017.”  While the bill has yet to be ratified, it places mor [...]
Jun 14, 2017 11:04:00 PM
As CTO at Certified Security Solutions, I’ve been asked the question more and more lately, “how will Blockchain impact PKI?”   There’s so much mysticism around Blockchain technology today that it can become difficult to separate t [...]
Feb 1, 2017 10:52:00 PM
The healthcare sector continues to build some of the largest, lucrative and vulnerable stores of data, making them attractive targets for cyber criminals. Further, malicious actors are more prevalent, organized and creative in the [...]