Filter Blogs expand_more
Blog add
Authors add
Products add
Product Categories add
11 Results for 'Microsoft'
Blog

By Bruce Morton

December 19, 2013

A recent article by the Microsoft malware protection center, “Be a real security pro - Keep your private keys private,” reminded me of some best practices.
Blog

By Bruce Morton

December 09, 2013

We have previously reviewed implementation of SHA-2, but with Bruce Schneier stating the need to migrate away from SHA-1 and the SHA-1 deprecation policy from Microsoft, the industry must start to make some progress in 2014.
Blog

By Bruce Morton

March 14, 2016

Entrust provides security beyond the TLS certificate. We are a strong supporter of the CA/Browser Forum standards and also support the requirements provided by our root embedding partners such as Microsoft and Mozilla. 
Blog

By Bruce Morton

October 12, 2015

EV Code Signing certificates are based on the Extended Validation (EV) Code Signing Certificates guidelines developed by the CA/Browser Forum. The guidelines combined the EV standard for validation with specific code signing components such as protecting private keys with hardware and providing time-stamp services. The demand for EV Code Signing certificates is growing thanks to the recent release of Windows 10. By October 29th, 2015 (90 days after release) all drivers provided to Microsoft must be submitted with a signature from an EV Code Signing certificate. Microsoft will trust the submission as the EV Code Signing certificate will prove that the publisher’s identity has been determined and the certificate issuance authorized. EV Code Signing certificates are similar to standard Code Signing certificates, but have some distinct advantages:
Blog

By Bruce Morton

April 13, 2015

As we have stated previously, website owners have a concern that an attacker can have a certificate issued for their domain name. We now have two systems which will help monitor certificates for domains: Certificate Transparency (CT) and Certificate Reputation. 
Blog

By Bruce Morton

March 20, 2015

Comodo issued an SSL certificate for live.fi. The issue is the certificate requester did not own or control the live.fi domain, which is owned by Microsoft. Was this Comodo’s fault? Let’s discuss. Since 2012, the certification authorities (CAs) which issue public trust SSL certificates must follow the domain verification methods in the CA/Browser Forum Baseline Requirements (BRs). The BRs provide methods for organization validation (OV) and domain validation (DV).
Blog

By Bruce Morton

March 04, 2015

FREAK is a new man-in-the-middle (MITM) vulnerability discovered by a group of cryptographers at INRIA, Microsoft Research and IMDEA . FREAK stands for “Factoring RSA-EXPORT Keys.”
Blog

January 30, 2019

We know it’s important for you to implement a solution that fits into your ecosystem and works the way you need it to.
Blog

By Libby Robinson

February 21, 2019

We know you’ve heard it before: the “we’re different” pitch. But give us a few minutes, and we think you’ll see why we’re so passionate about our PKI offering.
Blog

By Libby Robinson

February 21, 2019

PKI done properly follows a certain etiquette. There’s lots to know about the technology – and even more about management and policy.
Page 1 of 2