Blog

One Year Certs

Posted by on July 9, 2020 in Blog | 0 comments

Maximum SSL/TLS Certificate Validity is Now One Year Starting on September 1st, SSL/TLS certificates cannot be issued for longer than 13 months (397 days). This change was first announced by Apple at the CA/Browser Forum Spring Face-to-Face event in Bratislava back in March. Then last week, at the CA/B Forum’s Summer event (held virtually), Google announced its intention to match Apple’s changes with its own root program. There is also a browser-driven ballot that seeks to align the industry’s baseline requirements with the new root program changes. That issue is currently being debated by...

Read More

Could Quantum Computing Help Stave Off the Next Great Pandemic?

Posted by on June 11, 2020 in Blog | 0 comments

As we settle into month two of isolation in the world’s collective battle against the COVID-19 pandemic, one talking point you’ve undoubtedly heard time and again is that this won’t truly be over until there’s a vaccine. But the search for a vaccine is a complicated process that feels exceedingly abstract to most of us. How do you create a vaccine? That’s not a question we’ll be able to answer in this article, nor will we attempt to. Rather, we’re going to focus on just one piece of the vaccine hunt, a process called protein folding, and how another exceedingly complicated technology –...

Read More

How to do HTTPS … The Right Way

Posted by on June 2, 2020 in Blog | 0 comments

With secure HTTP — aka HTTPS (the “S” is short for “secure”) — swiftly becoming universal on the Internet, it is important to know how to configure HTTPS for your website the right way. The payoff for properly securing your website has many benefits, a few of which are: Secure transmission of sensitive information. HTTPS protects the sensitive information of your website visitors– whether that be personal profile information, passwords, payment information, etc. Additionally, electronic payment standards such as PCI DSS mandate the use of HTTPS when collecting payment...

Read More

Don’t ‘Compromise’ Your Code Amid Malware Mayhem

Posted by on May 12, 2020 in Blog | 0 comments

Code Signing Certificates demand a price premium in the underground online marketplace. This is no surprise considering that criminals sometimes use them to dupe their potential victims into installing malware in their machine. The code-signed malware appears safe to the users, whereas users receive an alert to be cautious if the malware is unsigned. In recent days, fraudsters have been injecting malware into popular remote conference software clients, such as Zoom, and many users are unaware that their devices are being compromised. Dark web sellers sometimes stand up fake companies that...

Read More

Digital Trust Is Elusive – Are Qualified Trust Services A Solution?

Posted by on May 1, 2020 in Blog | 0 comments

A popular saying goes: “Trust takes years to build, seconds to break, and forever to repair.” While I wouldn’t completely agree, the idea isn’t wrong. In real life trust between two parties is established over some period of time, depending on a variety of factors. Have you ever wondered why you initially trust some people more and others less, even if you’ve never met them before? There are a complicated multitude of factors that influence our thoughts: the person’s appearance, tone of voice, title or rank, etc. Trust is established over time but can be lost within a few moments. This poses...

Read More

Preparing for Quantum Computing

Posted by on April 21, 2020 in Blog | 0 comments

Quantum computing is advancing, and while experts are not sure when there will be a quantum computer powerful enough to break the RSA and ECC cryptographic algorithms that are currently in use, many are operating under the assumption that this can happen within a 10-15 year timeframe. This is a general timeline because there is no way to know when this will occur – it could happen sooner or it could happen later. The Road to Crypto Agility The IETF is working on proposals to create new X.509 certificate formats with multiple keys (called hybrid or composite certificates) that would help with...

Read More