+1-888-690-2424
  • Addressing Mixed Content Vulnerabilities

    I fail to understand why website operators continue to deploy sites with Mixed Content. Are the following trust dialogues presented to their users not sufficient incentive to correct the problem? Nevertheless, a recent study showed that 22 percent of sites use Mixed Content. Internet Explorer (IE) and Firefox present these security dialogues by default. That means if your site has

        in Secure Browsing, SSL, SSL Deployment
    0
  • Application Reputation

    Social-engineering attacks are more common than attacks on security vulnerabilities. Traditional defense against malware is a URL-based filter to screen out known malware websites. Microsoft introduced a new defense called Application Reputation that is available in Internet Explorer 9 (IE9) through the SmartScreen Filter. Application Reputation allows publishers and their applications to build a reputation over time through these principles:

        in Code Signing, Secure Browsing, SSL
    0
  • Online SSL Tools

    So you’ve gone to the trouble of buying and installing an SSL certificate.  How do know you installed it properly?  Some would just test the site by trying it with their browser. The problem is that Internet Explorer and Firefox validate the certificate path differently.  Firefox will install an intermediate certificate while IE doesn’t.  IE validates the shortest path, while

        in SSL Deployment
    0
  • Chain Certificates

    What are chain certificates? Chain certificates are referred to by many names — CA certificates, subordinate CA certificates or intermediate certificates.  Confused yet? Let’s break it down. It all starts with something called a root certificate. The root certificate is generated by a certification authority (CA) and is embedded into software applications. You will find root certificates in Microsoft Windows,

        in SSL Deployment, Technical
    0
  • Online SSL Tools

    So you’ve gone to the trouble of buying and installing an SSL certificate.  How do know you installed it properly?  Some would just test the site by trying it with their browser. The problem is that Internet Explorer and Firefox validate the certificate path differently.  Firefox will install an intermediate certificate while IE doesn’t.  IE validates the shortest path, while

        in SSL Deployment
    0
  • Chain Certificates

    What are chain certificates? Chain certificates are referred to by many names — CA certificates, subordinate CA certificates or intermediate certificates.  Confused yet? Let’s break it down. It all starts with something called a root certificate. The root certificate is generated by a certification authority (CA) and is embedded into software applications. You will find root certificates in Microsoft Windows,

        in SSL Deployment, Technical
    0
Page 2 of 3123