+1-888-690-2424
  • Infographic: Switching to SHA-2 SSL

    Will customers visit your site and see an non-secure browser warning because of SHA-1 SSL certificate? Learn the timeline for SHA-2 SSL migration and see how the different certificates affect upcoming releases of Google Chrome.

        in Certificate Management, Digital Certificates, SSL, SSL Deployment
    0
  • SSL Review: October 2014

    Part of 9 in the Series — SSL Review
    Entrust’s monthly SSL review covers SSL discussions — recaps news, trends and opinions from the industry. Entrust and CA Security Council Entrust Identity ON discussed: 3 Critical Mistakes to Avoid When Migrating to SHA-2 Understanding SHA-1 Vulnerabilities — Is SSL No Longer Secure? Key Steps for Migrating from SHA-1 to SHA-2 SSL Certificates SHA-2 Migration Places Spotlight on Diligent Certificate

        in Code Signing, SSL
    0
  • What is SHA-2? Why Should I Care?

    Part 9 of 9 in the Series — SHA-2 Migration
    The Technical and Business Reasons You Need to Move To SHA-2 First, what is SHA? In basic terms, SHA is a component of an SSL certificate used to ensure that data has not been modified. SHA accomplishes this by computing acryptographic function and any change to a given piece of data will result in a different hash value. As a

        in SSL
    0
  • SHA-2 Migration Places Spotlight on Diligent Certificate Management

    Part 5 of 9 in the Series — SHA-2 Migration
    If you’re in the process of migrating from SHA-1 to SHA-2 certificates, you may be realizing what a massive undertaking it is to discover and replace all the certificates your organization uses and relies upon. To state the obvious, you can’t manage certificates if you don’t know that they exist, where they’re deployed and when they expire. You must create

        in SSL
    0
  • What is SHA-2? Why Should I Care?

    Part 9 of 9 in the Series — SHA-2 Migration
    The Technical and Business Reasons You Need to Move To SHA-2 First, what is SHA? In basic terms, SHA is a component of an SSL certificate used to ensure that data has not been modified. SHA accomplishes this by computing acryptographic function and any change to a given piece of data will result in a different hash value. As a

        in SSL
    0
  • SHA-2 Migration Places Spotlight on Diligent Certificate Management

    Part 5 of 9 in the Series — SHA-2 Migration
    If you’re in the process of migrating from SHA-1 to SHA-2 certificates, you may be realizing what a massive undertaking it is to discover and replace all the certificates your organization uses and relies upon. To state the obvious, you can’t manage certificates if you don’t know that they exist, where they’re deployed and when they expire. You must create

        in SSL
    0
Page 1 of 4123...»»