Blogs

Google distrusting Verisign root certificate

1 min. reading time

December 24, 2015

In what appears to be another chapter in the troubled relationship between Google and Symantec, over the course of the coming weeks, Google will be moving to distrust Verisign’s “Class 3 Public Primary CA” root certificate operated by Symantec Corporation, across Chrome, Android, and Google products.

Continue reading

Adding security to Linux kernel

1 min. reading time

November 16, 2015

Linus Torvalds advocates the gradual evolution of the Linux kernel according to principles such as stability, reliability and performance, and never “breaking the user space” (i.e., never causing something that a user depends on to stop working). Many experts in the security field believe that this approach to security is too passive, bordering on indifference, as the kernel of an operating system is the essential part of any device, and listed 12 Linux kernel issues that need serious attention.

Continue reading

Symantec issued unauthorized digital certificates for Web sites

1 min. reading time

November 2, 2015

On September 18, Google reported the issuance of a not request and not authorized digital EV (Extended Validation) certificate, by Symantec’s Thawte Certification Authority, for google.com and www.google.com domains. In successive internal audits, Symantec delimited the incident to the issue of test certificates, but the inconsistency of the audits led Google to issue a tough review and place several requirements so that Symantec certificates can continue to be used in Google products.

Continue reading

NSA re-evaluates its elliptic curve cryptography (ECC) strategy

1 min. reading time

October 25, 2015

Cryptographers Neal Koblitz and Alfred Menezes speculate on the reasons why the NSA has revised its cryptographic strategy, moving away from the elliptic curve cryptography (ECC) and favouring the Post-Quantum cryptography (PQC).

Continue reading

Second Crypto War: battle won by the pro-security

1 min. reading time

October 15, 2015

Obama Administration decided not to pursue legislation that would force computer and communications equipment manufacturers to add backdoors to their products, for access by duly authorized government agencies.

Continue reading

Public Key Infrastructure for devices

1 min. reading time

October 1, 2015

To support the ISO 27001 accreditation of a Public Key Infrastructure for devices, Devise Futures structured the documentation of the Certification Authorities (CA) according to its documental typology methodology.

Continue reading

First invoice sent

1 min. reading time

September 21, 2015

Devise Futures' first invoice was sent today.

Continue reading

IT Solutions

1 min. reading time

September 7, 2015

With over twenty years of experience Devise Futures’ multidisciplinary specialists team provides state-of-the-art solutions that are fully integrable, professionally supported and cost effective.

Continue reading

Trustable and innovative solutions for lasting business improvements

1 min. reading time

September 7, 2015

Devise Futures provides state-of-the-art solutions that are fully integrable, professionally supported and cost effective.

Continue reading

Summer of 2015

1 min. reading time

September 2, 2015

All started in the summer of 2015 with a simple, bold idea: devise trustable and innovative IT solutions.

Continue reading