"Tech Solutions - one byte at a time!"
DigiBytes.com is the digital library of solutions for business and technology professionals.

Login Register Login
For Admins

code signing

Results 1 - 25 of 51Sort Results By: Published Date | Title | Company Name
Published By: Lookout     Published Date: Aug 30, 2017
Most people define mobile devices – smartphones and tablets – as those running a mobile-optimized operating system (e.g. iOS, Android, Windows Phone). There’s a trend emerging, however, in which traditional mobile devices are gaining functionality typically associated with PCs. At the same time, PCs are being architected more like mobile devices — an interbreeding of species, if you will. The iPad Pro, for example, has a keyboard. With Windows 10, phones and tablets can run “Universal” apps that also run on PCs. Windows 10 also has application-layer sandboxing, code-signing, and an app store with apps pre-vetted by Microsoft. In certain configurations (i.e. enterprise-managed devices), a laptop running Windows 10 has a security architecture that looks strikingly similar to a smartphone or tablet.
Tags : 
cybersecurity, enterprise networks, enterprise security architecture, risk reduction, ios attacks
    
Lookout
Published By: Venafi     Published Date: Jul 27, 2015
Learn how security professionals responded about the risk and impact to enterprises from attacks on keys and certificates.
Tags : 
cybersecurity, keys, certificates, cyber attacks, server certificate misuse, code-signing certificate misuse, ssh key misuse, cryptographic misuse
    
Venafi
Published By: Entrust Datacard     Published Date: May 15, 2014
Entrust Certificate Services provide one of the industry’s most comprehensive offerings of digital certificates and related services, tools and solutions. Whether it's a basic SSL certificate, more advanced EV multi-domain SSL certificates, or specialty certificates for secure email, code-signing or Adobe PDFs, Entrust offers a comprehensive portfolio of today's most-used digital certificates. And all are supported by Entrust's world-class service.
Tags : 
entrust, ssl, ecommerce, extended validation, chrome, mobile browsers, networking, it management
    
Entrust Datacard
Published By: Lumension     Published Date: Jan 18, 2013
Adobe's code-signing infrastructure got hacked and now you have to worry about some really bad software out there that your computers will think are valid, safe applications from Adobe. One of them is pwdump which gets Windows passwords.
Tags : 
security, network security, cyber attacks, access control, application security, authentication, business continuity, disaster recovery
    
Lumension
Published By: Symantec.cloud     Published Date: Oct 11, 2012
The emergence of mobile applications has fundamentally changed the way that millions of people around the world work, play, and communicate. Meanwhile, cybercriminals want to infect and exploit as many mobile devices as they can to steal information.
Tags : 
symantec, phishing, malware, security, internet security, mobile security, mobile
    
Symantec.cloud
Published By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 13, 2011
Gaining the trust of online customers is vital for the success of any company that transfers sensitive data over the Web. When shopping online, consumers are concerned about identity theft and are therefore wary of providing untrusted sources with their personal information, especially their credit card details. Other types of online businesses require different but equally sensitive information. People are reluctant to provide their national insurance numbers, passwords, or other confidential personal information, or sometimes even just name, address, and phone number. Perhaps the information will be intercepted in transit, they fear, or perhaps the destination itself is manned by imposters with ill intent.  The result is an abandoned transaction.
Tags : 
security, ssl, trust, authentication, online security, online business, ssl certificates, ssl certificate
    
VeriSign Authentication Services, now a part of Symantec Corp.
Published By: VeriSign     Published Date: Feb 10, 2011
This paper will show how code signing works, how attacks can be mounted against unsigned software, (including autoupdate software), and how real-world signing systems protect software vendors, enterprises and end users.
Tags : 
verisign, ssl spoofing attack, code protection, security, code signing certificates, malicious software, security management
    
VeriSign
Published By: VeriSign     Published Date: Feb 10, 2011
This white paper will detail the rise of mobile applications and why code signing certificates are essential to protecting the entire mobile apps ecosystem.
Tags : 
verisign, mobile apps, code signing, mobile application development, signing certificates, mobile computing, mobile data systems, mobile workers
    
VeriSign
Published By: thawte     Published Date: Aug 27, 2008
This guide will show you how Code Signing Certificates are used to secure code that can be downloaded from the Internet. You will also learn how these certificates operate with different software platforms.
Tags : 
ssl, thawte, certified, certification, secure socket, encryption, web development, web service security
    
thawte
Published By: VeriSign Incorp.     Published Date: Jan 15, 2008
Online visitors are becoming more and more wary about transacting online. One way to provide reassurance that your Web site is reputable and safe is to implement the latest SSL encryption technology on your site. Read this guide to learn about the latest in SSL.
Tags : 
security, ssl, authentication, online security, online business, ssl certificates, ssl certificate, certificate authority
    
VeriSign Incorp.
Published By: VeriSign Incorp.     Published Date: Jul 02, 2008
Learn about governmental standards and regulations, such as HIPAA and Sarbanes-Oxley, covering data protection and privacy. Then, learn how your enterprise can be compliant utilizing the latest encryption technologies.
Tags : 
verisign, pci, hipaa, sarbanes-oxley, fisma, gramm-leach-bliley act, state notice of breach laws, security
    
VeriSign Incorp.
Published By: VeriSign Incorp.     Published Date: Oct 15, 2008
Learn about the current trends in Internet fraud, and how VeriSign Inc. is helping organizations protect critical data and instill trust for their customers.
Tags : 
security, ssl, authentication, online security, online business, ssl certificates, ssl certificate, certificate authority
    
VeriSign Incorp.
Published By: Symantec     Published Date: Apr 04, 2013
This white paper discusses the malware threat, the potential impact on your business, and how to protect your company and your customers by using code signing.
Tags : 
malware, anti-virus, spyware, scareware, anti-malware, cyber criminals, code signing, security
    
Symantec
Published By: Symantec     Published Date: Apr 04, 2013
How Code Signing Can Bolster Security for Mobile Applications
Tags : 
code signing, mobile, apps, applications, mobile applications, hacking, cyber criminals, mobile security
    
Symantec
Published By: Symantec     Published Date: Apr 04, 2013
Stuxnet, a high-profile cyber-attack, used malware signed with legitimate code signing certificates. What went wrong and how can you protect your own assets?
Tags : 
code signing, cyber attack, anti-virus, intrusion prevention, private keys, asset protection, security, access control
    
Symantec
Published By: Symantec     Published Date: Apr 04, 2013
In this business guide, we discuss how the latest code signing technology works to secure software code and content for applications that are directly downloaded to mobile devices from the Internet.
Tags : 
code signing, mobile, apps, applications, mobile applications, hacking, cyber criminals, mobile security
    
Symantec
Published By: Symantec     Published Date: Nov 30, 2015
Two trends make code signing more important than ever: the explosion of consumer applications for mobile and desktop devices and the proliferation of malware.
Tags : 
    
Symantec
Published By: Symantec     Published Date: Nov 30, 2015
Hold for copy
Tags : 
    
Symantec
Published By: Symantec     Published Date: Nov 30, 2015
La signature de code s’impose plus que jamais comme un impératif incontournable sous l’impulsion de deux grandes tendances : 1) l’explosion des applications grand public sur les terminaux fixes et mobiles, et 2) la prolifération des logiciels malveillants (malwares).
Tags : 
    
Symantec
Published By: Symantec     Published Date: Nov 30, 2015
La proliferación de malware y el boom de las aplicaciones de consumidor para dispositivos móviles y de escritorio hacen que la firma de código sea más importante que nunca.
Tags : 
    
Symantec
Published By: Symantec     Published Date: Nov 30, 2015
Due trend rendono oggi la firma del codice piů importante che mai: il boom delle applicazioni commerciali per i dispo-sitivi mobili e desktop e la proliferazione del malware.
Tags : 
    
Symantec
Published By: Symantec     Published Date: Nov 30, 2015
By code signing software, developers can ensure the integrity of their application, protect their intellectual property and brand image and help combat malware.
Tags : 
    
Symantec
Published By: Symantec     Published Date: Nov 30, 2015
Das Zusammentreffen zweier Trends macht Code Signing zur unerlässlichen Sicherheitsmaßnahme: die rasant steigende Anzahl an Mobilgeräte- und Desktopanwendungen auf dem Verbrauchermarkt und die zunehmende Verbreitung vonMalware
Tags : 
    
Symantec
Published By: Symantec     Published Date: Nov 30, 2015
Tvĺ trender gör kodsignering viktigare än nĺgonsin: alla nya konsumentprogram för mobila och stationära enheter, samt alla sabotageprogram.
Tags : 
    
Symantec
Published By: Symantec Corporation     Published Date: Feb 25, 2014
The efficacy of code signing as an authentication mechanism for software depends on the secure storage of code signing private keys used by software publishers. Companies that are diligent and willing to invest in the appropriate security measures can make the compromise of their private keys highly unlikely. This white paper describes recent security breaches and why they may have happened, along with best practices, especially for the Windows platform, which can help to safeguard the private keys associated with code signing certificates.
Tags : 
symantec, stuxnet, cyber-attack, security, certificate authority, application security, security policies
    
Symantec Corporation
Start   Previous   1 2 3    Next    End
Search      

Special Report

In this webinar Black Duck Software (www.blackducksoftware.com), together with representatives of SAP, will review the benefits open source offers to development organizations, the management challenges it presents, and approaches for addressing those challenges.

Add Research

Get your company's research in the hands of targeted business professionals.

Modern Analyst Media Modern Analyst Media
Modern Analyst Requirements Modern Analyst Media Modern Analyst DigiBytes
Copyright 2009-2014 by Modern Analyst Media LLC Home  |  Featured Bytes  |  Popular Bytes  |  All Topics  |  Vendor Directory