Blog

Certificate Revocation Lists: A Basic Overview

by Futurex on July 6th, 2015

Certificates are used daily in the world of information security for transactions that vary from checking e-mail to validating electronic payments to transmitting healthcare records. When properly used, they are an effective way to verify credentials. And just as the process of issuing certificates must be tracked using an auditable method, the same is true for certificates that need to be revoked. For this, Certificate Revocation Lists (CRLs) are used.

Read More
Securing the Internet of Things

Securing the Internet of Things

by Futurex on May 27th, 2015

You may be familiar with the Internet of Things, AKA the rapidly growing network of smart devices that are capable of connecting to the internet. From watches to refrigerators to vehicles, virtually any machine can now be made with integrated internet capabilities. Network connections significantly increase the ease with which your devices are managed, monitored, and used on a daily basis. But with the convenience of using your device to access the internet comes to the risk that someone... Read More

Deconstructing PKCS #11

by Futurex on January 22nd, 2015

To some, PKCS #11 may be a common term used on a daily basis, but to others, it’s unfamiliar jargon. Whether you’re a tech guru or not, PKCS #11 is a beneficial technology that you can implement into your organization’s IT infrastructure.

What Is It?

PKCS #11 (Public-Key Cryptographic Standard #11) is a standard originally developed by RSA Laboratories and currently maintained by OASIS. PKCS #11 specifies a standardized API in the C programming language that offers substantial benefits... Read More

Key Management Refresher: Software vs. Hardware

by Futurex on December 30th, 2014

For any organization managing encryption keys, the process of creating, maintaining, and improving a key management system can seem a frustrating or even impossible task. These feelings of frustration often stem from a few prominent mistakes that frequently occur. Beyond simple annoyance with an inefficient system, key management mistakes can have a far more damaging effect: data breaches. Fortunately, these mistakes are easily preventable with some instruction. In our whitepaper, Ten Key Management Mistakes…And How to Avoid Them, we discuss ten actions that can make or break a key management system. This blog post covers the final mistake in the whitepaper.

Read More