Certificate Revocation Lists: A Basic Overview

by Futurex on July 6th, 2015

Certificates are used daily in the world of information security for transactions that vary from checking e-mail to validating electronic payments to transmitting healthcare records. When properly used, they are an effective way to verify credentials. And just as the process of issuing certificates must be tracked using an auditable method, the same is true for certificates that need to be revoked. For this, Certificate Revocation Lists (CRLs) are used.

Read More

Futurex Named a National Cybersecurity Awareness Month Champion

by Futurex on July 1st, 2015

We, at Futurex, arm organizations and individuals with industry-leading hardware security modules (HSMs), among other solutions, to secure sensitive data. Beyond selling state-of-the-art security products, we also provide on-site services and publish whitepapers, case studies, and a blog—all of which contribute to the global body of data and cyber security literature. Becoming an NCSAM Champion was just a natural step forward.

Read More

Audit Preparation: Four Top Mistakes to Avoid

by Futurex on June 30th, 2015

As a Futurex Solutions Architect, I’ve traveled around the globe performing on-site assessments for organizations preparing for compliance audits. While the environments and processes may be completely different depending on industry, purpose, and implementation, there are several key issues that often crop up at each assessment that could likely result in audit findings. My role is to identify those issues and teach these organizations how to fix them as well as avoid repeating the mistakes in the future. For any business attempting to maintain a compliant and secure environment, here are, in my opinion, the top four pitfalls that can keep you from passing an audit:

Read More
Securing the Internet of Things

Securing the Internet of Things

by Futurex on May 27th, 2015

You may be familiar with the Internet of Things, AKA the rapidly growing network of smart devices that are capable of connecting to the internet. From watches to refrigerators to vehicles, virtually any machine can now be made with integrated internet capabilities. Network connections significantly increase the ease with which your devices are managed, monitored, and used on a daily basis. But with the convenience of using your device to access the internet comes to the risk that someone... Read More