Digital Certificates

EPCS Compliance Is Here — Are You Ready?

Electronic Prescribing of Controlled Substances (EPCS) is here. Many states have already adopted the rules associated with this new regulation and the remaining states are expected to become compliant over the next couple of years. If you're involved in prescribing or distributing medication, then you need to understand the impact EPCS will have on you. We'll break down why EPCS compliance is needed, how to become compliant and how we can help.

What is Cloud-Based PKIaaS and Why Does it Matter?

Public key infrastructure (PKI) is evolving. Enterprises are increasingly moving away from expensive, on-site PKI and towards easily scalable, flexible, demand-driven cloud solutions. We know you’ve got questions about how cloud-based PKI can enhance your cybersecurity posture, and we’ve got the answers.

smart city communication network graphic

HID Crescendo's Diverse Functionality & Compatibility

When we talk to customers about HID® Crescendo® authenticators, they are often aware of only a small part of this device family's capabilities. Across diverse enterprises, Crescendo is the preferred means of trusted identity due to the broad range of standards supported. We'll answer the most common questions and cover it all — the specifications, certifications and compatibility — in this definitive blog post.

Crypto-Agility: Are You Ready to Implement It?

We're all familiar with "business agility" — an organization's ability to adapt, react, stay competitive, and reduce time to market. Increasingly, there's a move towards "crypto-agility" — protecting your data and systems by using the latest encryption and cryptographic techniques. Crypto-agility relies on similar concepts to business agility: adaptive algorithms, reacting to the latest threats, staying ahead of hackers, and rapidly implementing changes.

Time Is Running Out for 2-Year TLS/SSL Certificates

It shouldn’t come as a surprise that we are talking about TLS/SSL digital certificate lifespan again; after all, the industry has been mandating a shorter lifespan for TLS/SSL certificates for the past few years. It is good security practice to use short-lived certificates, as it reduces cyber risk for organizations by shortening the window of opportunity for hackers if the certificate keys get stolen.

How to Use PKI to Implement Zero Trust Security

The concept of Zero Trust is a security model where all users and devices are treated as untrustworthy, even if they are already inside a network. The term Zero Trust is credited to Forrester Research based on a security model they published in 2010, which challenged the norm at the time of defending only the network perimeter and questioned the assumption that anything already inside the network is not a threat.

Preparing for the Future of Digital Certificates

Digital certificates secure everything from devices to web pages, but only if they’re properly managed. Technologists who follow public key infrastructure (PKI) and IoT have identified two key trends that will have a broad impact on this market space. The first is that digital certificate lifespans continue to get shorter. The second is a massive uptick in the number of devices requiring a certificate.

How to Choose the Right TLS/SSL Certificate

Transport Layer Security (TLS), or famously known as Secure Socket Layer (SSL), are cryptographic protocols that establish an encrypted connection between a browser and a web server. This connection protects data privacy and integrity as communication between both parties remains encrypted. In short, it keeps the internet connection secure and protects sensitive data such as personally identifiable information, credit card details, and passwords from attackers.

Short-Lived Digital Certificates Are Taking Over

One reason organizations like yours have benefitted from using digital certificates is because of the longevity of the technology itself. Since certificates have been in use for decades, they’re widely supported and easy to integrate with business systems and applications—without the compatibility woes you may face with newer technologies. Even at their relatively distinguished age, certificates provide strong security thanks to PKI’s cryptographically mighty algorithms.

A Security Playbook for Working from Home

Chances are you are deep in the middle of a remote working scenario that is not of your own creation. The current infectious disease outbreak has sent workforces everywhere scrambling. Employees who have never worked remotely suddenly find themselves dispatched to home offices, IT is under incredible stress, and—as of this writing—it’s hard to predict when we will return to normal.

Hang in there, brave, kindred IT spirit! You’re not alone.