+1-888-690-2424
  • Protect Your Private Keys: Three Easy Steps for Safe Code-Signing

    A recent article by the Microsoft malware protection center, “Be a real security pro – Keep your private keys private,” reminded me of some best practices. There are far too many cases of illegitimate code being signed by a stolen private key for legitimately signed code-signing certificates. In these cases, the owners of the private keys have not secured the

        in Code Signing, Public Key Infrastructure
    0
  • Java Secures Supply Chains through Code Signing

    This post was originally published by Bruce Morton & Erik Costlow on the CA Security Council blog. We have recently discussed the benefits of code signing in two posts: Securing Software Distribution with Digital Signatures and Improving Code Signing. These posts covered the role of code signatures as a “digital shrinkwrap” designed to answer a simple question: Did the software I am

        in Code Signing
    0
  • Securing Software Distribution with Digital Code Signing

    This post was originally published on the CA Security Council blog. Code signing certificates from publicly trusted Certification Authorities (CAs) fulfill a vital need for authentication of software distributed over the Internet in our interconnected world. As the commonly referred to “Internet of things” continues to grow, consumers have access to millions of applications for their desktops, laptops, and mobile devices.

        in Code Signing, Public Key Infrastructure
    0
  • Code Signing: Best Practices

    The biggest issue with code signing is the protection of the private signing key associated with the code signing certificate. If the key gets compromised, then your certificate is worthless. A compromised key may also jeopardizethe software that you have already signed. Here are some best practices for code signing: 1. Minimize access to private keys Computers with keys should

        in Code Signing
    0
  • Securing Software Distribution with Digital Code Signing

    This post was originally published on the CA Security Council blog. Code signing certificates from publicly trusted Certification Authorities (CAs) fulfill a vital need for authentication of software distributed over the Internet in our interconnected world. As the commonly referred to “Internet of things” continues to grow, consumers have access to millions of applications for their desktops, laptops, and mobile devices.

        in Code Signing, ...
    0
  • Code Signing: Best Practices

    The biggest issue with code signing is the protection of the private signing key associated with the code signing certificate. If the key gets compromised, then your certificate is worthless. A compromised key may also jeopardizethe software that you have already signed. Here are some best practices for code signing: 1. Minimize access to private keys Computers with keys should

        in Code Signing
    0
Page 1 of 4123...»»