Code Signing

Home » Code Signing » Page 5

Code Signing Insights

Our Code Signing Insights provide in-depth information on the process of digitally signing executables and scripts to confirm the identity of software publishers and verify code integrity. Learn about the technical elements of code signing certificates, their role in public key infrastructure, and how proper signing boosts security by protecting end users from malware and other threats. Gain expert insights into using, managing, and validating code signing certificates.

Steps for Creating CSR and Key Attestation Using YubiKey Token

Steps for Creating CSR and Key Attestation Using YubiKey Token

Steps For Generating CSR and Key Attestation with YubiKey Token YubiKey offers a hardware-based solution that allows you to generate the CSR securely on the YubiKey device itself rather than on your computer. This provides higher security and assurance compared to...

FIPS 140-2: Everything You Need to Know About It

FIPS 140-2: Everything You Need to Know About It

Getting Started with FIPS 140-2 FIPS 140-2 is a security standard used to accredit cryptographic modules. It was developed by the National Institute of Standards and Technology (NIST) to establish requirements for cryptographic modules to protect sensitive data....

Cloud Hardware Security Module: What You Need to Know About?

Cloud Hardware Security Module: What You Need to Know About?

Cloud Hardware Security Module; Meaning, Features, Pros & Cons Data breaches and cyberattacks are on the rise globally, causing massive financial losses and reputation damage for organizations. To secure sensitive data like encryption keys, payment card...

Guide to Setup YubiHSM 2 for Java Code Signing Certificate

Guide to Setup YubiHSM 2 for Java Code Signing Certificate

Using YubiHSM2 with Java Code Signing Java code signing allows developers to cryptographically sign JAR files and Java applets to verify their integrity and authenticity. Signing code ensures that the code has not been modified since it was signed and provides trust...

FIPS Hardware: Everything You Need to Know About It

FIPS Hardware: Everything You Need to Know About It

What is FIPS Stand for FIPS stands for Federal Information Processing Standards. FIPS is a set of standards and guidelines for cryptography and computer systems security that the United States federal government develops for use in non-military government computer...

What are the Best Practices for Code Signing HSM

What are the Best Practices for Code Signing HSM

Overview of Hardware Security Module A Hardware Security Module (HSM) is a physical computing device that provides extra security for sensitive cryptographic operations like code signing. HSMs protect private keys used for code signing and provide strong cryptographic...

Code Signing Time Stamping: What Is It & How It Works?

Code Signing Time Stamping: What Is It & How It Works?

Getting Started with Time Stamping Code Signing Certificates Code signing time stamping, also known as timestamping, is an important part of the code signing process that provides proof of when a piece of code was signed. It helps establish trust in digitally signed...

What Does YubiHSM 2 Mean: How It Works?

What Does YubiHSM 2 Mean: How It Works?

Getting Started with YubiHSM 2 YubiHSM 2 is a Hardware Security Module (HSM) device manufactured by Yubico for cryptographic key management and cryptographic operations. It provides a high level of protection for sensitive data like cryptographic keys, digital...

Hardware Security Module: Everything You Need to Know About It

Hardware Security Module: Everything You Need to Know About It

Understanding Hardware Security Module (HSM) A Hardware Security Module (HSM) is a physical computing device that provides extra security for sensitive data. HSMs are designed to safeguard and manage digital keys, accelerate cryptographic processes, and provide strong...