Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
Home > DigiCert > Traditional Code Signing Threat Landscape 5 critical vulnerabilities / bad practices to address
 

Traditional Code Signing Threat Landscape 5 critical vulnerabilities / bad practices to address

White Paper Published By: DigiCert
DigiCert
Published:  Jun 19, 2018
Type:  White Paper
Length:  3 pages

Code signing essentially relies on a Public Key Infrastructure, which means code signing certificates are made out of a pair of public and private key - the public key is signed by a trusted Certificate Authority such as DigiCert, and the private key is kept by the owner and used to sign the code to secure.

Although the technology behind code signing certificates is proven, managing them - and by extension managing the private keys - is an activity that can be very complex, especially when the key owner(s) do not understand their value.

In order to help customers to solve for the shortcomings in regard to the management of code signing private keys and user access, DigiCert has developed Secure App Service. Download this whitepaper to find out more about how this can help your business.



Tags :