Filter Blogs expand_more
Blog add
Authors add
Products add
Product Categories add
10 Results for 'Microsoft'
Blog

Changes to Support SHA-1 Migration

By Bruce Morton
March 14, 2016
Entrust provides security beyond the TLS certificate. We are a strong supporter of the CA/Browser Forum standards and also support the requirements provided by our root embedding partners such as Microsoft and Mozilla. 
Blog

Protect Your Private Keys: Three Easy Steps for Safe Code-Signing

By Bruce Morton
December 19, 2013
A recent article by the Microsoft malware protection center, “Be a real security pro - Keep your private keys private,” reminded me of some best practices.
Blog

SHA-1 Deprecation, On to SHA-2

By Bruce Morton
December 09, 2013
We have previously reviewed implementation of SHA-2, but with Bruce Schneier stating the need to migrate away from SHA-1 and the SHA-1 deprecation policy from Microsoft, the industry must start to make some progress in 2014.
Blog

EV Code Signing Certificates

By Bruce Morton
October 12, 2015
EV Code Signing certificates are based on the Extended Validation (EV) Code Signing Certificates guidelines developed by the CA/Browser Forum. The guidelines combined the EV standard for validation with specific code signing components such as protecting private keys with hardware and providing time-stamp services. The demand for EV Code Signing certificates is growing thanks to the recent release of Windows 10. By October 29th, 2015 (90 days after release) all drivers provided to Microsoft must be submitted with a signature from an EV Code Signing certificate. Microsoft will trust the submission as the EV Code Signing certificate will prove that the publisher’s identity has been determined and the certificate issuance authorized. EV Code Signing certificates are similar to standard Code Signing certificates, but have some distinct advantages:
Blog

Microsoft Deploys Certificate Reputation

By Bruce Morton
April 13, 2015
As we have stated previously, website owners have a concern that an attacker can have a certificate issued for their domain name. We now have two systems which will help monitor certificates for domains: Certificate Transparency (CT) and Certificate Reputation. 
Blog

What Happened with Live.fi?

By Bruce Morton
March 20, 2015
Comodo issued an SSL certificate for live.fi. The issue is the certificate requester did not own or control the live.fi domain, which is owned by Microsoft. Was this Comodo’s fault? Let’s discuss. Since 2012, the certification authorities (CAs) which issue public trust SSL certificates must follow the domain verification methods in the CA/Browser Forum Baseline Requirements (BRs). The BRs provide methods for organization validation (OV) and domain validation (DV).
Blog

Is Your SSL Server Vulnerable to a FREAK Attack?

By Bruce Morton
March 04, 2015
FREAK is a new man-in-the-middle (MITM) vulnerability discovered by a group of cryptographers at INRIA, Microsoft Research and IMDEA . FREAK stands for “Factoring RSA-EXPORT Keys.”
Blog

5 Reasons Why Entrust Datacard PKI is Proper PKI

By Libby Robinson
February 21, 2019
We know you’ve heard it before: the “we’re different” pitch. But give us a few minutes, and we think you’ll see why we’re so passionate about our PKI offering.
Blog

From Pauper PKI to Proper PKI: Building PKI Policy That Works

By Libby Robinson
February 21, 2019
PKI done properly follows a certain etiquette. There’s lots to know about the technology – and even more about management and policy.
Blog

2015 – Looking Back, Moving Forward

By Bruce Morton
January 12, 2015
This post was originally published on the CA Security Council blog. Looking Back at 2014, looking forward to 2015 and beyond.
Page 1 of 1