+1-888-690-2424
  • SSL Review: October 2014

    Part of 9 in the Series — SSL Review
    Entrust’s monthly SSL review covers SSL discussions — recaps news, trends and opinions from the industry. Entrust and CA Security Council Entrust Identity ON discussed: 3 Critical Mistakes to Avoid When Migrating to SHA-2 Understanding SHA-1 Vulnerabilities — Is SSL No Longer Secure? Key Steps for Migrating from SHA-1 to SHA-2 SSL Certificates SHA-2 Migration Places Spotlight on Diligent Certificate

        in Code Signing, SSL
    0
  • Protect Your Private Keys: Three Easy Steps for Safe Code-Signing

    A recent article by the Microsoft malware protection center, “Be a real security pro – Keep your private keys private,” reminded me of some best practices. There are far too many cases of illegitimate code being signed by a stolen private key for legitimately signed code-signing certificates. In these cases, the owners of the private keys have not secured the

        in Code Signing, Public Key Infrastructure
    0
  • Java Secures Supply Chains through Code Signing

    This post was originally published by Bruce Morton & Erik Costlow on the CA Security Council blog. We have recently discussed the benefits of code signing in two posts: Securing Software Distribution with Digital Signatures and Improving Code Signing. These posts covered the role of code signatures as a “digital shrinkwrap” designed to answer a simple question: Did the software I am

        in Code Signing
    0
  • Securing Software Distribution with Digital Code Signing

    This post was originally published on the CA Security Council blog. Code signing certificates from publicly trusted Certification Authorities (CAs) fulfill a vital need for authentication of software distributed over the Internet in our interconnected world. As the commonly referred to “Internet of things” continues to grow, consumers have access to millions of applications for their desktops, laptops, and mobile devices.

        in Code Signing, Public Key Infrastructure
    0
  • Java Secures Supply Chains through Code Signing

    This post was originally published by Bruce Morton & Erik Costlow on the CA Security Council blog. We have recently discussed the benefits of code signing in two posts: Securing Software Distribution with Digital Signatures and Improving Code Signing. These posts covered the role of code signatures as a “digital shrinkwrap” designed to answer a simple question: Did the software I am

        in Code Signing
    0
  • Securing Software Distribution with Digital Code Signing

    This post was originally published on the CA Security Council blog. Code signing certificates from publicly trusted Certification Authorities (CAs) fulfill a vital need for authentication of software distributed over the Internet in our interconnected world. As the commonly referred to “Internet of things” continues to grow, consumers have access to millions of applications for their desktops, laptops, and mobile devices.

        in Code Signing, ...
    0
Page 1 of 4123...»»