Digital Certificates Research
-
Royal Holloway: Secure multiparty computation and its application to digital asset custody
Sponsored by: TechTarget ComputerWeekly.comFor this article in our Royal Holloway security series, the authors provide a brief overview of multiparty computation (MPC) and highlight the benefits of MPC-based bitcoin custody over traditional approaches.
-
How to tackle cloud, IAM, and digital certificate problems in your organization
Sponsored by: TechTarget SecurityIn this in-depth resource, you’ll find extensive amounts of information regarding options for mitigating digital security certificate problems, as well as a breakdown of the challenges posed by IAM in the extended enterprise.
-
Explaining How Trusted SSL Certificates and Forged SSL Certificates Work
Sponsored by: TechTarget SecurityThis expert e-guide explores how trusted and forged SSL certificates work, as well as the dangers that arise from compromised Certification Authorities (CAs). Discover what you need to know about the state of the digital marketplace today – read on to learn more.
-
The Pros and Cons of Delivering Web Pages Over an SSL Connection
Sponsored by: TechTarget SecurityThough Secure Sockets Layer (SSL) offers distinct security advantages, there are drawbacks to this method of webpage delivery, as well. This expert e-guide explores the pros and cons of delivering webpages over an SSL connection. See if this strategy is right for your organization – read on to learn more.
-
How SSL-Encrypted Web Connections are Intercepted
Sponsored by: TechTarget SecurityIn this expert e-guide, uncover 4 key strategies for defending against illegal TLS/SSL-encrypted Web connection interception. Learn how these cyber-attacks work, the challenges of digital certificates, SSL-interception tools, and more by reading on now.
-
Build your Content Security and Document Management Plan
Sponsored by: AdobeIn this expert e-guide, we explore how you can create an effective content security and document management strategy. Discover 5 tips for a sound content security policy and learn about the differences between digital signature, e-signature, and digital certificates.
-
The Digital Certificate: How It Works, Which to Buy
Sponsored by: TechTarget SecurityIf you're in the market to buy digital certificates, read this guide to learn what features are essential and how to evaluate the available options.
-
A Certified Concern
Sponsored by: TechTarget SecurityCan that CA be trusted? Certificate authority risks are many, but since there's no avoiding SSL and TLS, at least for now. Here's how to increase CA security.
-
Your Guide for Migrating from 1024-bit to Stronger SSL Certificate Key Lengths
Sponsored by: Symantec Website Security SolutionsAs a proactive measure, the NIST has recommended that organizations eliminate 1024-bit RSA certificates in favor of stronger keys. Learn about the upcoming change in key lengths and find tips for managing your transition to using stronger certificates.
-
Securely Implement and Configure SSL to Ward Off SSL Vulnerabilities
Sponsored by: GeoTrust, Inc.This e-guide from SearchSecurity.com explores the issues threatening SSL vulnerabilities and offers advice on how to defend against said risks. View now to learn more!
-
Explaining How Trusted SSL Certificates and Forged SSL Certificates Work
Sponsored by: GeoTrust, Inc.This e-guide from SearchSecurity.com takes an in-depth look at what Certificate Authorities and digital certificates do for secure web browsing and explores what trusted SSL certificates and forged SSL certificates mean to your business.
-
Securely Implement and Configure SSL to Ward Off SSL Vulnerabilities
Sponsored by: GeoTrust, Inc.This expert e-guide describes the dangerous vulnerabilities that can arise from insecure Secure Socket Layer (SSL) usage, and details essential tips and strategies for properly implementing and configuring SSL in order to ensure Web security.
-
Securing your Private Keys as Best Practice for Code Signing Certificates
Sponsored by: VeriSign EMEAThis paper examines recent security breaches such as Stuxnet, and offers best practice measures, especially for the Windows platform, that can help to safeguard private keys so that your company doesn't become tools of malicious hackers.
-
Secure Mobile Computing: Using Two-factor Authentication with VPNs and Disk Encryption
Sponsored by: Aladdin Knowledge SystemsAlthough mobile computing offers organizations many competitive advantages, it also entails significant security risks to corporate networks and sensitive corporate data. Read this whitepaper to learn about strong authentication solutions.
-
Global Threat Research Report: Russia
Sponsored by: VeriSign, IncThis report takes an in-depth look at the security threat the Russian Business Network (RBN) is to North American-based enterprise businesses. Learn more about their current infrastructure, its corruption, and the impact the RBN has on business today.
-
Building Blocks of Transparent Web Security: Server-Gated Cryptography
Sponsored by: VeriSign, IncRead a research paper from the Yankee Group and learn about the importance of Server Gated Cryptography (SGC)-enabled SSL Certificates for online businesses.
-
Understanding Digital Certificates & Secure Sockets Layer (SSL): A Fundamental Requirement for Internet Transactions
Sponsored by: Entrust, Inc.Moving your business online provides the convenience and accessibility your customers and partners demand. Learn how to use SSL digital certificates to gain customer trust and potentially increase revenue by adding more online services.
-
How to Offer the Strongest SSL Encryption for your Company
Sponsored by: VeriSign, IncMany IT professionals have little understanding of an extremely important protocol within SSL. This technical white paper provides a quick overview on how Server Gated Cryptography (SGC) affects the encryption levels of a Website to its visitors.
-
PKI Certificates - A Source of Confusion?
Sponsored by: ArticSoftIf you look inside MS Outlook at the security tab or you visit any of your favorite PKI or CA vendors, you will be educated in the need to understand the certificate.