+1-888-690-2424
  • Mozilla Endorses SSL Baseline Requirements

    The CA/Browser Forum SSL Baseline Requirements have been endorsed by Mozilla and have been included in their certificate authority (CA) certificate policy.

        in Certificate Management, Secure Browsing, SSL
    0
  • Certificate Transparency

    I mentioned in an earlier blog, about certification authority authorization (CAA), that one of the issues of having many public CAs is that any or all can issue SSL certificates for any domain. Certificate Transparency (CT) is another proposed method to resolve this issue. The draft CT specification states the following goals: The goal is to make it impossible (or

        in Secure Browsing, SSL, SSL Deployment
    0
  • Understanding SSL

    Just thought I would let you know about a podcast called Sophos Techknow – Understanding SSL. Hopefully there won’t be much new for the regular readers of this blog, but the information may be valuable for those new to the SSL industry. I did want to make note of a few things. The podcasters discuss 650 CAs in the SSL

        in EV SSL, Secure Browsing, SSL
    0
  • Code Signing: Best Practices

    The biggest issue with code signing is the protection of the private signing key associated with the code signing certificate. If the key gets compromised, then your certificate is worthless. A compromised key may also jeopardizethe software that you have already signed. Here are some best practices for code signing: 1. Minimize access to private keys Computers with keys should

        in Code Signing
    0
  • Understanding SSL

    Just thought I would let you know about a podcast called Sophos Techknow – Understanding SSL. Hopefully there won’t be much new for the regular readers of this blog, but the information may be valuable for those new to the SSL industry. I did want to make note of a few things. The podcasters discuss 650 CAs in the SSL

        in EV SSL, Secure Browsing, SSL
    0
  • Code Signing: Best Practices

    The biggest issue with code signing is the protection of the private signing key associated with the code signing certificate. If the key gets compromised, then your certificate is worthless. A compromised key may also jeopardizethe software that you have already signed. Here are some best practices for code signing: 1. Minimize access to private keys Computers with keys should

        in Code Signing
    0
Page 1 of 212