Writing Event Plugin Handlers for the Certificate Reporting Tool (CRT)
The Certificate Reporting Tool (CRT) provides reporting and notification capabilities to an existing Public Key Infrastructure (PKI). The reports and notifications are highly customizable for content,...
View ArticleMicrosoft Security Update: Digital Certificate Key Length Minimum 1,024 Bits
Microsoft security update to block access to digital certificates that have a key length of less than 1,024 bits on 10/9/12 In a world where speed and simplicity are preferred, the size of a...
View ArticleSHA-3 Announcement
As many know, the cryptographic hash function known as Secure Hash Algorithm 1 (SHA-1) has been deemed weak by NIST, and is no longer recommended. The NSA addressed the weaknesses in SHA-1 by...
View ArticleThe Truth About PKI Managed Service Offerings
Recently I was engaged with a customer who decided to source certificates from a service provider rather than build a PKI. In this case the customer was limited in resources and an evaluation of build...
View ArticleAuthentication in an Ultra-Connected World: Internet of Things
As PKI practitioners, we’ve been asked the question for years: “What’s the best way to get a digital certificate on _____?” What gets filled into the blank has expanded dramatically over time,...
View Article1024-bit RSAs Days are Numbered
In December of 2011, the CA/Browser Forum, comprised of representatives from the major Certification Authorities such as Symantec, Comodo, GoDaddy, and DigiCert, as well as browser vendors such as...
View ArticleAirWatch & CSS – Partnership Featuring Certificate Management System
Cleveland, OH – September 24, 2013 – Certified Security Solutions’ Certificate Management System (CMS) is featured in the AirWatch Marketplace as a fully integrated mobile certificate solution....
View ArticleSHA-1 Signed Certificates No Longer Trusted?
By now, you may have already heard that Microsoft will start deprecating trust in certificates with SHA-1 signatures in 2016. In our view, this is a prudent move by Microsoft. We’ve long known that...
View ArticleFive Common “DIY PKI” Mistakes to Avoid
In the 12+ years that CSS has been helping organizations deploy Public Key Infrastructures, we frequently run into situations where PKI components are already present in the environment. Often it’s an...
View ArticleWhere Does My Heartbleed Now?
Vulnerabilities tend to morph over time. Upon initial identification, researchers, companies, and experts tend to rush to offer opinions, sometimes factual and sometimes less so. The disclosures...
View Article