digital certificate

Results 51 - 56 of 56Sort Results By: Published Date | Title | Company Name

Prefabricated Data Centers: Business Advantages for Colocation Providers

Published By: Schneider Electric     Published Date: Jun 07, 2019
New digital technology now makes it feasible to integrate process control and SIF within a common automation infrastructure. While this can provide productivity and asset management benefits, if not done correctly, it can also compromise the safety and security of an industrial operation. Cybersecurity and sabotage vulnerability further accentuate the need for securing the safety instrumented system (SIS). Certainly, a common platform approach using similar hardware and software dedicated for control and safety functions, respectively, can provide the potential for cost savings. However, it is widely acknowledged that utilizing separate, independent, and diverse hardware/software for safety and control is the optimal way to protect against potentially catastrophic common cause and systematic design and application errors. Different vendors offer varied degrees of integration and solutions. The question is: how to provide an integrated control and safety solution with advanced functionality and productivity without compromising safety and security? And, where do users draw the line? A third-party (e.g., TÜV) certification of the hardware/software systems to IEC 61508 specifications carries significant advantages, but should this be the only criterion? How does a third-party certificate extend to the plant’s overall assignment of risk reduction credits for all independent protection layers (IPL)? Control system embedded safety logic solvers may actually increase the SIL requirements of the SIF if no credit is allowed for the distributed control system (DCS) as an IPL. Download the white paper to learn more.
Tags : 
smart control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability
    
Schneider Electric

Code Signing Best Practices for Adobe AIR Applications

Published By: GlobalSign     Published Date: Jan 11, 2011
White Paper explaining the growing need for Digitally Signing Adobe AIR applications, and expanding the market reach of your application by distributing trusted code.
Tags : 
code signing, digital certificate, pki, adobe air, digital signatures, secure code, .net, c++
    
GlobalSign

Step Up Encryption with Thawte SGC SuperCerts

Published By: Thawte     Published Date: Dec 29, 2015
Learn about how digital certificates with SGC technology are able to step-up encryption levels for certain browsers to 128-bits. A discussion of the business benefits of deploying SGC certificates is also included.
Tags : 
encryption, sgc certificates, browser, security management, web service security, business intelligence
    
Thawte

Securing your Apache Web Server with a Thawte Digital Certificate

Published By: Thawte     Published Date: Dec 29, 2015
In this guide we examine the importance of Apache-SSL and who needs an SSL certificate.
Tags : 
security, apache, web server, digital certificate, business continuity, compliance, security management, web service security
    
Thawte

Real-world Attack Case Study: Misuse of Keys and Certificates Bypass Critical Security Controls

Published By: Venafi     Published Date: Mar 04, 2015
This technical case study addressing key and certificate security issues is designed for security conscious enterprises to understand real-life attack scenarios that threaten their businesses in today’s world. This white paper demonstrates a recent attack that used cryptographic keys and digital certificates as well as guidance on how to protect certificates and keys and quickly discover and remediate breaches. This paper should be read by more technical IT security staff who are interested in detailed attack methods and remediation tactics. The executive summary is intented for IT Security leaders (CISOs and their direct reports) and addresses the proof-of-concept attack impacts on the business. The attack scenario described in this technical white paper is based on a reproduction of a real-world attack in a Raxis test environment that simulated an enterprise security infrastructure.
Tags : 
venafi, ssh keys, vpn credentials, digital certificates
    
Venafi

Revealing the secret life of your Code Signing certificates

Published By: DigiCert     Published Date: Jun 19, 2018
Many security-minded organizations utilize code signing to provide an additional layer of security and authenticity for their software and files. Code signing is carried out using a type of digital certificate known as a code-signing certificate. The process of code signing validates the authenticity of legitimate software by confirming that an application is from the organization who signed it. While code-signing certificates can offer more security, they can also live an unintended secret life providing cover for attack groups, such as the Suckfly APT group. In late 2015, Symantec identified suspicious activity involving a hacking tool used in a malicious way against one of our customers. Normally, this is considered a low-level alert, however, the hacktool had an unusual characteristic not typically seen with this type of file; it was signed with a valid code-signing certificate. Download this whitepaper to find out more about how you can protect your business from such threats.
Tags : 
    
DigiCert
Start   Previous    1 2 3     Next   End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.