Device Identification , Digital Identity , Encryption & Key Management

Providing Strongly Authenticated Device Identity

Ted Shorter of CSS on the Drivers and Need for Advanced Digital Identity Solutions
Providing Strongly Authenticated Device Identity

Explosive growth in network scale and complexity demands a next generation Public Key Infrastructure (PKI) management platform. Expansive enterprise digital certificate and PKI usage, coupled with the advent of massive Internet of Things (IoT) device introductions, requires automation for secure and scalable certificate/device life cycle management.

Ted Shorter of Certified Security Solutions (CSS) says security leaders must prepare now to take full advantage of next-gen PKI solutions. "Certificates have become one of the de facto standards for providing strongly authenticated device identity," says Shorter, who is chief technology officer at CSS. "There are projections of tens of billions of certificates for IoT devices being issued, and we're certainly seeing that today."

In an interview about next-gen PKI, Shorter discusses:

  • The main components of a future-proof, next-generation PKI;
  • Why older PKI algorithms are at risk and the need for quantum-safe, crypto-agile solutions;
  • Other certificate/PKI security challenges organizations face, including scale and cost.

Shorter is the chief technology officer at Certified Security Solutions Inc. (CSS). Responsible for CSS' intellectual property development efforts, Shorter helps align CSS' security focus with the changing enterprise and IoT landscape. A renowned PKI expert, he has provided oversight to hundreds of private-sector enterprise PKI deployments in multiple vertical markets, including healthcare, finance, manufacturing, aerospace and e-commerce. Shorter has worked in the security arena for more than 25 years in the fields of cryptography, application security, authentication and authorization services, and software vulnerability analysis.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.