iccc-logo

Changes in Common Criteria and Product Advocacy

As companies look to their 2016 sales objectives, the allure of the FED and it’s $70 billion budget, as well as emerging markets for healthcare, finance, critical infrastructure and the Internet of Things (IoT) is …

Read more

blank

FIPS 140-2 & Common Criteria Security Certifications

The numbers are in and with our partners help; Corsec has had one of its most successful quarters in company history! And the future looks even more promising. With the rising threat of security breaches in today’s technology landscape, the need for products that can deliver a high degree of trusted protection…

How-Heartbleed-Affects-Your-Security-Certifications

How Heartbleed Affects Your Security Certifications

Much has been in the news over the past couple of months about the security vulnerability known as Heartbleed. It is of vital interest to businesses and consumers, but especially so for businesses with products intended to provide security for their users. There are some specific and unique impacts to companies who are planning or are in the midst…

CC-Certification-Common-Criteria-Certification

Common Criteria Certification: What Is It?

Do you need to open the door to sell your IT security product to the U.S. government? That seems like it should be a process that is simple to work through, but think again. Any IT security product that will be used by the U.S. government for national security systems, either to handle classified and even some non-classified…

FIPS 140, CSfC, Common Criteria, UC APL

Maximize ROI: Market Your Certification

Taking the time, effort and resources to achieve FIPS or Common Criteria certification or UC APL listing is a big deal. It’s not an insignificant investment, and when it’s finally completed, you want to see a significant return, right? The most obvious solution is just to sell more product. And while this may seem both simple and obvious, we all know…

Entropy-Testing-for-Security-Certifications

Entropy Testing: Tips for Meeting Requirements

In the second post of our two-part series, we continue our discussion with panelists from Computer Sciences Corporation: Lachlan Turner, Jason Cunningham, and Maureen Barry. Continuing where we left off with last week’s post, we’ll dive deeper into entropy and answer some of the many questions now arising…

Entropy-Testing-for-Security-Certifications

Entropy for FIPS and Common Criteria: What Is It?

In the world of cryptography, data is only safe as long as the keys used to protect that data are kept secure. While, on one hand, this means that keys must be protected against unauthorized access, it also means that keys must be created in a way that makes them difficult for an attacker to guess. To produce cryptographically strong…

FIPS 140, CSfC, Common Criteria, UC APL

A Look Back: 2013 for FIPS, Common Criteria and DoDIN APL

The end of the year is a great time to look back at important milestones and use what we’ve learned to plan for the upcoming year. This year, clearing the air where myths and misconceptions were concerned was a theme that we saw come up repeatedly at Corsec, and laying the groundwork for smooth process…

CC-Certification-Common-Criteria-Certification

Understanding Common Criteria Technical Working Groups

I recently had a conversation with a product vendor who was new to the Common Criteria community and it was refreshing to talk about and look at the Common Criteria “machine” from an outside perspective. One of the interesting parts of that machine is the Common Criteria User Forum (CCUF). It provides a voice and communications…

niap

NIAP’s Targeted Assurance Protection Profiles: Different, Not Less Secure

One way for a product vendor to make sure that a product undergoing a Common Criteria (CC) evaluation is providing expected security functionality is to conform to a Protection Profile (PP) for that product type. PPs outline the appropriate security functionality for a given product type, and are usually…