+1-888-690-2424
  • Top 10 Holiday Scams to Steer Clear of this Season – Part 2

    This is Part 2 of a two-part series. To read the first post, click here. Top 10 Holiday Scams to Steer Clear of this Season 6. Order shipment notification When doing your holiday shopping, always make sure that the email notification confirming your order shipment is directly tied to the official company of which you conducted business. Never click random

        in Enterprise Authentication, Mobility, Secure Browsing
    0
  • Top 10 Holiday Scams to Steer Clear of this Season – Part 1

    Top 10 Holiday Scams to Steer Clear of this Season You have spent all night looking for the perfect gift online for your spouse, children or significant other. After hours of searching, you finally come across the ultimate package certain to grant you a lifetime pass to the Nice List — two tickets to the big game, hotel accommodations and

        in Mobility
    0
  • Java Secures Supply Chains through Code Signing

    This post was originally published by Bruce Morton & Erik Costlow on the CA Security Council blog. We have recently discussed the benefits of code signing in two posts: Securing Software Distribution with Digital Signatures and Improving Code Signing. These posts covered the role of code signatures as a “digital shrinkwrap” designed to answer a simple question: Did the software I am

        in Code Signing
    0
  • SHA-1 Deprecation, On to SHA-2

    Part 6 of 9 in the Series — SHA-2 Migration
    We have previously reviewed implementation of SHA-2, but with Bruce Schneier stating the need to migrate away from SHA-1 and the SHA-1 deprecation policy from Microsoft, the industry must start to make some progress in 2014. Web server administrators will have to make plans to move from SSL and code signing certificates signed with the SHA-1 hashing algorithm to certificates

        in SSL Deployment, SSL
    0
  • Java Secures Supply Chains through Code Signing

    This post was originally published by Bruce Morton & Erik Costlow on the CA Security Council blog. We have recently discussed the benefits of code signing in two posts: Securing Software Distribution with Digital Signatures and Improving Code Signing. These posts covered the role of code signatures as a “digital shrinkwrap” designed to answer a simple question: Did the software I am

        in Code Signing
    0
  • SHA-1 Deprecation, On to SHA-2

    Part 6 of 9 in the Series — SHA-2 Migration
    We have previously reviewed implementation of SHA-2, but with Bruce Schneier stating the need to migrate away from SHA-1 and the SHA-1 deprecation policy from Microsoft, the industry must start to make some progress in 2014. Web server administrators will have to make plans to move from SSL and code signing certificates signed with the SHA-1 hashing algorithm to certificates

        in SSL Deployment, SSL
    0
Page 2 of 24123...5101520...»»