Lights, Coffee, Action: Routines That Work For You
Discover how SmartThings routines bring ease, energy, and calm to your everyday life.
The post Lights, Coffee, Action: Routines That Work For You appeared first on SmartThings Blog.
Discover how SmartThings routines bring ease, energy, and calm to your everyday life.
The post Lights, Coffee, Action: Routines That Work For You appeared first on SmartThings Blog.
Not long ago, cryptography management was a quiet, behind-the-scenes task. TLS certificates had long validity periods, post-quantum cryptography (PQC) felt like a distant conversation, and maintaining an up-to-date crypto inventory wasn’t a top priority.
Fast forward to 2025, and the landscape has shifted dramatically. TLS certificate lifespans are shrinking, thanks to CA/Browser Forum mandates. PQC is no longer theoretical—NIST has standardized PQC algorithms, and migration planning is well underway. Meanwhile, regulations are tightening, cyber threats are evolving, and crypto-agility has become a business-critical priority.
Yet, many organizations aren’t ready for the challenges these changes present. While cryptography is embedded everywhere, visibility is limited, cryptographic operations are fragmented, and policies are outdated. Achieving crypto-agility seems impossible when maintaining basic crypto hygiene is already daunting.
As these challenges mount, forward-looking enterprises are now starting to implement an organizational framework focused on improving cryptography and how it is managed: the Crypto Center of Excellence (CCoE).
A Crypto Center of Excellence is a framework that brings together people, processes, and technology to oversee and manage an organization’s cryptographic strategy and operations. The primary goal of a CCoE is to serve as the central authority, ensuring cryptographic practices are standardized, efficient, and aligned with the organization’s security objectives.
Key responsibilities of a CCoE include:
A well-structured CCoE brings together cross-functional experts:
Depending on the organization’s size and complexity, the CCoE may also include additional operational stakeholders like PKI Administrators, Key Management Administrators, Security Operations Analysts, DevSecOps or Automation engineers for overseeing certificate and key lifecycle operations.
A CCoE isn’t just a conceptual framework—it’s a practical solution that offers tangible value:
Several key trends underscore the necessity of establishing a CCoE:
Cryptography today is critical infrastructure and establishing a CCoE is an excellent way of keeping this infrastructure efficient, secure, and ready for whatever comes next. It isn’t about adding bureaucracy—but about creating clarity, control, and confidence in your organization’s cryptographic practices. In a world of shrinking certificate lifespans, quantum risks, and non-stop digital transformation, that’s exactly what organizations need.
If you are ready to take the first step, talk to one of our experts today about how AppViewX certificate lifecycle management and PKI solutions help support a Crypto Center of Excellence (CCoE).
And if you’re looking for the foundation to support it, start with AppViewX AVX ONE CLM, a solution that’s built for crypto-agility. By providing complete certificate visibility, end-to-end CLM automation, and continuous policy control and governance, AVX ONE CLM simplifies and streamlines certificate lifecycle management to eliminate outages, reduce risks, ensure compliance, and enable crypto-agility. Learn more about AppViewX AVX ONE CLM
SmartThings continues to invest in the Developer Center with tools for partners such as Test Suite, Product Cloning, and Certification by Similarity to simplify product integration and certification for a single product or an entire portfolio.
The post Device Profile Builder: Easily Integrate Your Products with SmartThings appeared first on SmartThings Blog.
It only takes one expired certificate to bring everything to a halt. When a certificate expired at a smart meter company, it halted energy tracking for over 15 million homes. In another case, robotic arms at an automotive plant froze mid-production—all because of a single expired certificate. These aren’t isolated incidents—they’re symptoms of a much bigger issue.
As enterprises scale their use of automation, machine identities are multiplying at an unprecedented rate. But few have a system to manage them. Without a scalable system, trust quickly becomes a ticking time bomb. That’s where AppViewX AVX ONE CLM steps in—delivering the visibility, automation, and control you need to secure your machine identity landscape.
Machine and non-human identities are increasing exponentially, far outpacing the growth of human identities. According to the 2024 ESG Survey, organizations, on average, have 20X more non-human identities than human identities. And the growth isn’t slowing down, 52% of organizations predict an additional 20% increase in NHIs they manage in 2025.
These non-human identities include a wide range of device and workload identities:
As the machine-to-machine ecosystem grows, so does the challenge of managing trust at scale. If you can’t see them, rotate them, or revoke them—you’re exposed.
Traditional PKI and Certificate Lifecycle Management CLM solutions were built for a different era—one where certificates were issued to humans, lived for years, and were managed through manual approvals and periodic audits.
But machine and non-human identities don’t play by those rules. They:
Legacy PKI and CLM systems, still reliant on manual processes, weren’t designed for this pace or scale. They do not provide the visibility, automation, and real-time control needed to manage today’s sprawling machine and non-human identity landscape. As a result, organizations face increasing risk—from expired certificates that cause outages, to blind spots that open the door for security breaches and compliance failures.
AppViewX AVX ONE CLM offers a modern, scalable, and secure certificate lifecycle management solution purpose-built for today’s machine-driven, Zero Trust environments. It delivers complete visibility, end-to-end automation, and continuous policy control and governance of digital certificates and keys—across machines, applications, workloads, and cloud services. Designed with crypto-agility in mind, AVX ONE CLM addresses the unique challenges of managing non-human identities (NHIs):
By integrating deeply into both machine-native systems and enterprise IT, AppViewX AVX ONE CLM empowers your organization to:
The number of machine and non-human identities will continue to rise—and fast. Without proper management, trust breaks down, compliance fails, and innovation grinds to a halt. AppViewX AVX ONE CLM delivers the visibility, automation, and control needed to manage machine identities effectively and build the scalable trust foundation your autonomous enterprise demands.
Manage every certificate. Secure every workload. Trust every machine—with AppViewX AVX ONE CLM.
To learn more, request a demo of AppViewX AVX ONE CLM today.

From securing communications and authenticating users to ensuring data integrity, Public key infrastructure (PKI) plays a vital role in keeping today’s organizations secure and trusted. While its importance is clear, deploying and managing PKI effectively is anything but straightforward.
For many organizations, PKI is still a patchwork of legacy systems, manual processes, scattered certificate inventories, and growing complexity. Combine that with a shortage of skilled PKI experts and a lack of automation, and it’s no surprise that outages, vulnerabilities, and compliance issues keep surfacing.
Further, as IT environments evolve and change—with multi-cloud, DevOps, IoT, and the looming shift to post-quantum cryptography—traditional PKI setups are being pushed to their limits. Without the right processes, tools, and people in place, PKI can quickly become a bottleneck—or worse, a serious cybersecurity risk.
What’s needed to move past these challenges is a more strategic and structured approach to PKI. That’s where the PKI Maturity Model (PKIMM) comes in—a framework from the PKI Consortium that helps organizations assess their current PKI setup, identify gaps, and build a stronger, more resilient PKI for the future.
The PKI Maturity Model is a comprehensive and practical framework designed to help organizations assess how well their PKI is working—and where it needs improvement. It provides PKI and Security teams a way to step back, evaluate, and enhance their PKI maturity in a structured way.
Whether you’re running a lean team or managing PKI for a global enterprise, the PKI maturity model is applicable to all types of organizations—no matter the industry or use case.
Here’s what the PKI Maturity Model helps you with:
The PKI Maturity Model breaks things down into five clearly defined maturity levels—kind of like an audit scorecard for your PKI. Each level reflects how structured, consistent, and forward-looking your PKI practices are and the risks that come with where you currently stand.
However, these levels aren’t assessed in isolation. The model examines your PKI across four key modules that encompass all PKI dimensions: Governance, Management, Operations, and Resources. Each module includes a set of specific categories you’ll be scored on.
Together, these modules and their 15 categories, covering all the essential aspects—people, processes, and technology—provide a well-rounded view of your PKI, from high-level governance to hands-on operations and team readiness.

To simplify the assessment process, the PKI Consortium offers a straightforward, Excel-based assessment tool. It guides you through defining the scope of your environment, scoring each category, and generating a report that shows your maturity levels and areas for improvement. This structured process ensures consistent and repeatable evaluations, unlike scattered and ad-hoc self-assessments.
The PKI Maturity Model dives deep into all aspects of PKI, but a few categories stand out for their significant impact. Here’s a quick look at what low and high maturity look like in each—and what the model evaluates.
Well-defined policies and security measures are vital for successful PKI management. This model checks how well your PKI is governed—whether your rules, roles, and procedures are clearly defined and consistently applied.
This is where everything comes together. The model looks at how you discover, inventory, and profile certificates throughout the organization. It also examines how you issue, renew, revoke, and provision certificates.
PKI should evolve with your business and the broader security landscape. The model looks for robust and reliable change management processes that enable swift transitions without disrupting operations.
Automation is one of the proven ways to enhance PKI efficiency and minimize human error. The model assesses the extent of automation in certificate lifecycle management.
Visibility drives control. In this category, the model examines whether you have the necessary controls in place to detect issues, respond to threats, and maintain compliance.
Getting to higher maturity across these categories doesn’t happen overnight—but knowing where you stand is the first step. And with the PKI Maturity Model as your guide, you can move forward with a plan that’s built on structure, insight, and best practices.
Building PKI maturity is a journey, and modern PKI and CLM solutions can help you leap ahead by replacing complexity with speed, scale, and agility.
The AppViewX AVX ONE Platform is built to simplify and modernize PKI and certificate lifecycle management. It combines powerful certificate lifecycle management automation (AVX ONE CLM) with private PKI-as-a-Service (AVX ONE PKIaaS), giving you complete visibility and centralized control over all private and public certificates across your hybrid multi-cloud, containerized, and IoT environments.
AVX ONE CLM simplifies certificate lifecycle management with complete visibility, end-to-end automation, and continuous policy control and governance of digital certificates and keys. AVX ONE PKIaaS simplifies and modernizes private PKI management. You can quickly and securely set up fully compliant private CAs and start issuing certificates within minutes—no hardware to buy, no complex infrastructure to maintain.
Together, they help eliminate outages, mitigate security risks, ensure compliance, and build crypto-agility–all of which directly boost your PKI maturity.
Ready to level up your PKI and CLM? Use the PKI Maturity Model as your roadmap and let AppViewX AVX ONE be the engine that drives you to a secure, resilient, and future-ready PKI.
Check out AppViewX AVX ONE Platform, request a demo, or talk to one of our experts today.
Recently, Google announced that starting August 1, 2025, the Google Chrome browser will no longer trust TLS certificates issued by Chunghwa Telecom and Netlock Certificate Authorities (CAs). According to Google, the decision follows a pattern of compliance failures and a lack of measurable progress in addressing publicly reported issues.
Chunghwa Telecom is Taiwan’s largest integrated telecom service provider and operates a public Certificate Authority (CA) called ePKI, which issues digital certificates for secure web communications. Netlock, based in Hungary, is a specialized CA offering digital certification services, including TLS/SSL certificates, electronic signatures, and time stamping.
Any certificates issued by these CAs on or before July 31, 2025, will remain valid. However, certificates issued after that date will trigger browser warnings—like the dreaded “Your connection isn’t private” alert—creating trust issues for website visitors. Google intends to roll out these changes with Chrome 139, scheduled for release in early August.
Google’s decision to distrust Chunghwa Telecom and Netlock CAs wasn’t made lightly. Citing the reasons for distrust, Google stated, “Over the past several months and years, we have observed a pattern of compliance failures, unmet improvement commitments, and the absence of tangible, measurable progress in response to publicly disclosed incident reports. When these factors are considered in aggregate and considered against the inherent risk each publicly-trusted CA poses to the internet, continued public trust is no longer justified.”
If you’re using certificates from either Chunghwa Telecom or Netlock, Google strongly recommends switching to a new, publicly trusted CA as soon as possible—ideally before your current certificates expire, if that is after July 31, 2025. Doing so helps avoid trust warnings and service disruptions and outages on your websites and internet applications.
While it’s technically possible to reissue certificates from either of the two distrusted CAs before the August 1, 2025, deadline to buy more time, that’s only a temporary fix. You’ll still need to complete a full migration eventually—and the longer you wait, the higher the risk of service disruptions.
This isn’t the first time Google has pulled trust from a CA—and it likely won’t be the last.
Just last year, Google distrusted the Entrust CA. Thousands of organizations that relied on TLS certificates from Entrust were forced into a fast-paced migration to a new trusted public CA before the November deadline (in just about 4 months!). It was stressful, chaotic, and, for many, still ongoing.
In the broader picture, Google’s move should be welcomed as it reinforces the high standards expected of CAs and sends a clear message: trust must be earned through transparency, security, and accountability. That said, the responsibility for ensuring digital trust doesn’t end with browser vendors. Organizations must also step up—by implementing a multi-CA strategy and embedding CA agility and crypto-agility into their Certificate Lifecycle Management (CLM) practices.
Migrating from one CA to another is not just about setting up new CAs. It often means revoking and replacing thousands of certificates (across various certificate types and endpoints), retiring CA-related services, and coordinating efforts across multiple teams and systems.
Without a robust CLM solution, this process is prone to errors, bottlenecks, and missed deadlines. IT and security teams come under immense pressure, and the risk of certificate outages can ripple across applications and services.
Consider the recent Entrust CA distrust. For many enterprises operating without an automated CLM solution, CA migration has been a painful and complex process.
Whether you’re affected by the Entrust, Chunghwa Telecom, or Netlock CA distrust—or simply want to be ready for the next one—here’s how AppViewX can help.
AppViewX AVX ONE CLM, a comprehensive certificate lifecycle management automation solution, delivers crypto- and CA-agility to make the whole process simple and fast through:
Browsers play a critical role in enforcing accountability and raising the bar for Certificate Authorities. But, their safeguards only go so far.
For organizations, true resilience comes from being prepared—by diversifying your CA portfolio, automating certificate lifecycle management, and embedding crypto-agility into your CLM strategy. That’s how you stay ahead of the next CA distrust event.
Check out the AVX ONE CLM: Seamless CA Switch Capability Datasheet to see how AppViewX is making CA migrations fast and frictionless.
Already impacted by Entrust, Chunghwa Telecom, or Netlock? talk to one of our experts today to make the switch with confidence.