• SSL Review: August 2014

    Part 7 of 7 in the Series — SSL Review
    Entrust’s monthly review of SSL discussions — and likely other digital certificates — recaps news, trends and opinions from the industry. Entrust and CA Security Council Entrust Identity ON discussed: Using SSL to Increase SEO Root Certificates with 1024-bit RSA Keys are Being Removed CA Security Council discussed: Who Sets the Rules Governing Certification Authorities? Google to Give Priority Ranking

        in SSL
    0
  • 2014 – Looking Back, Moving Forward

    We take a look back at the news and trends that helped, hindered or drove the certificate industry in 2013. With that context, we peak at what 2014 could have in store for us. Will Always-On SSL and the deprecation of SHA-1 be the headlines that shape the next 12 months?

        in SSL, SSL Deployment
    0
  • Protect Your Private Keys: Three Easy Steps for Safe Code-Signing

    A recent article by the Microsoft malware protection center, “Be a real security pro – Keep your private keys private,” reminded me of some best practices. There are far too many cases of illegitimate code being signed by a stolen private key for legitimately signed code-signing certificates. In these cases, the owners of the private keys have not secured the

        in Code Signing, Public Key Infrastructure
    0
  • Java Secures Supply Chains through Code Signing

    This post was originally published by Bruce Morton & Erik Costlow on the CA Security Council blog. We have recently discussed the benefits of code signing in two posts: Securing Software Distribution with Digital Signatures and Improving Code Signing. These posts covered the role of code signatures as a “digital shrinkwrap” designed to answer a simple question: Did the software I am

        in Code Signing
    0
  • Protect Your Private Keys: Three Easy Steps for Safe Code-Signing

    A recent article by the Microsoft malware protection center, “Be a real security pro – Keep your private keys private,” reminded me of some best practices. There are far too many cases of illegitimate code being signed by a stolen private key for legitimately signed code-signing certificates. In these cases, the owners of the private keys have not secured the

        in Code Signing, ...
    0
  • Java Secures Supply Chains through Code Signing

    This post was originally published by Bruce Morton & Erik Costlow on the CA Security Council blog. We have recently discussed the benefits of code signing in two posts: Securing Software Distribution with Digital Signatures and Improving Code Signing. These posts covered the role of code signatures as a “digital shrinkwrap” designed to answer a simple question: Did the software I am

        in Code Signing
    0
Page 1 of 4123...»»