Got PKI? CSS at RSA
Certified Security Solutions sent a team to the 2012 RSA Security Conference in San Francisco where one of the underlying themes was mobile security. Located in the Microsoft Pavilion, team CSS...
View ArticleSecurity Vulnerability- The Use of the Simple Certificate Enrollment Protocol...
It’s been in the works for quite some time, but we are finally able to publicly announce a problem that we’ve encountered, related to the use of the Simple Certificate Enrollment Protocol, or SCEP, in...
View ArticleDigiNotar—What Went Wrong?
Why PKI Procedures are so important to your business Most people who are familiar with Public Key Infrastructure have been aware of the unfortunate events that happened to the Dutch Public CA...
View ArticleIn-App Mobile Certificates Made Easy with mCMS (Part 1)
The ability to install certificates on iOS devices has been well-supported since iOS 4.2. The Mobile Certificate Management System (mCMS) currently provides a secure mechanism for installing...
View ArticleIn-App Mobile Certificates Made Easy with mCMS (Part 2)
In Part I, we took a look at how easy it is to integrate in-app certificates with your iOS applications with mCMS 1.2. In Part II, I’ll show you how Android integrates with mCMS 1.2 to leverage in-app...
View ArticleWriting Event Plugin Handlers for the Certificate Reporting Tool (CRT)
The Certificate Reporting Tool (CRT) provides reporting and notification capabilities to an existing Public Key Infrastructure (PKI). The reports and notifications are highly customizable for content,...
View ArticleCertificate Reporting Tool (CRT) v2.1- SSL Certificate Support
Certified Security Solutions, Inc., leading Microsoft identity and security partner announced today its support of SSL certificate management in the new release of the Certificate Reporting Tool (CRT)....
View ArticleMicrosoft Security Update: Digital Certificate Key Length Minimum 1,024 Bits
Microsoft security update to block access to digital certificates that have a key length of less than 1,024 bits on 10/9/12 In a world where speed and simplicity are preferred, the size of a...
View ArticleSHA-3 Announcement
As many know, the cryptographic hash function known as Secure Hash Algorithm 1 (SHA-1) has been deemed weak by NIST, and is no longer recommended. The NSA addressed the weaknesses in SHA-1 by...
View ArticleThe Truth About PKI Managed Service Offerings
Recently I was engaged with a customer who decided to source certificates from a service provider rather than build a PKI. In this case the customer was limited in resources and an evaluation of build...
View ArticleAuthentication in an Ultra-Connected World: Internet of Things
As PKI practitioners, we’ve been asked the question for years: “What’s the best was to get a digital certificate on _____?” What gets filled into the blank has expanded dramatically over time,...
View ArticleSystem Center Operations Manager (SCOM) Management Pack Available with...
Cleveland, OH – June 27, 2013 – Certified Security Solutions (CSS), a leading provider of certificate and PKI management software and services, announces immediate availability of a System Center...
View Article1024-bit RSAs Days are Numbered
In December of 2011, the CA/Browser Forum, comprised of representatives from the major Certification Authorities such as Symantec, Comodo, GoDaddy, and DigiCert, as well as browser vendors such as...
View ArticleAirWatch & CSS – Partnership Featuring Certificate Management System
Cleveland, OH – September 24, 2013 – Certified Security Solutions’ Certificate Management System (CMS) is featured in the AirWatch Marketplace as a fully integrated mobile certificate solution....
View ArticleSHA-1 Signed Certificates No Longer Trusted?
By now, you may have already heard that Microsoft will start deprecating trust in certificates with SHA-1 signatures in 2016. In our view, this is a prudent move by Microsoft. We’ve long known that...
View ArticleFive Common “DIY PKI” Mistakes to Avoid
In the 12+ years that CSS has been helping organizations deploy Public Key Infrastructures, we frequently run into situations where PKI components are already present in the environment. Often it’s an...
View ArticleWhere Does My Heartbleed Now?
Vulnerabilities tend to morph over time. Upon initial identification, researchers, companies, and experts tend to rush to offer opinions, sometimes factual and sometimes less so. The disclosures...
View ArticleWriting Event Plugin Handlers for the Certificate Reporting Tool (CRT)
The Certificate Reporting Tool (CRT) provides reporting and notification capabilities to an existing Public Key Infrastructure (PKI). The reports and notifications are highly customizable for content,...
View ArticleMicrosoft Security Update: Digital Certificate Key Length Minimum 1,024 Bits
Microsoft security update to block access to digital certificates that have a key length of less than 1,024 bits on 10/9/12 In a world where speed and simplicity are preferred, the size of a...
View ArticleSHA-3 Announcement
As many know, the cryptographic hash function known as Secure Hash Algorithm 1 (SHA-1) has been deemed weak by NIST, and is no longer recommended. The NSA addressed the weaknesses in SHA-1 by...
View Article