In 2022, 33% of newly discovered vulnerabilities were flagged as critical or high. Explore OWASP’s secure coding practice checklist and learn how to leverage its power to boost your threat protection and reduce attack risks Digitalization is both a blessing and a curse for organizations.…
Blogging About Everything Software Security – Threats, Updates, Best Practices, Tips, & More
Software touches the everyday lives of billions of people around the world. They rely on us (the software industry) to deliver dependable, safe applications for them to use. This blog is dedicated to working together to do our part to make the (software) world a better place…one piece of software at a time!
Are you ready for a year when multifactor authentication may become ineffective and attackers will adopt new hacking vectors like cloud-aware ransomware to get to your data? Learn how to enhance your database security now to stay ahead of cyber…
Not sure how to bundle a certificate and private key into a .PFX file? We’ll walk you through how to merge your OV code signing certificate and cryptographic private key using OpenSSL As a reputable software…
Welcome to 2023, a year full of new technology trends. Software development is continually evolving — are you ready to take on the challenge? Let’s start the year with a bang with this list of best software developer courses…
Do you think that the purpose of hashing is limited to password security? Think again — hashing is much more than that. Discover how, in a world where 82% of breaches involve human elements like errors and misuse,…
Get Your Code Signing Certificate Issued in Just 3 Steps It’s great to see that you’ve decided to get that mandatory trust factor: a code signing certificate, which is needed for signing an application or software package…
Combining your OV code signing certificate and a cryptographic private key is virtually as easy as one, two, and three! Here’s how you can quickly do it using SSL Shopper’s converter tool Code signing certificates enable you…
F4baaa8135e0f9a993f0258a4d095db475096896bd3adb48369f1f70c1f0d9d4. Wondering what that is? It’s the file hash for VLC for Windows. Explore the meaning behind gibberish strings like this that are used by many but known by few In 2021, IBM reports that organizations took an…
Data protection abstract concept vector illustration. Database security software, data protection solution, business information safety, access policy, program development abstract metaphor.
Have you published or downloaded code today? Did you know that 79.1% of the malware samples reported to Spamhaus in October 2022 were infected .exe files? Discover the potential consequences of releasing or downloading unsigned codes. Find out…
In 3Q 2022, IBM’s software segment alone took home $5.8 billion in revenue. Did their focus on marketing contribute to its success? It surely did. Discover 19 breakthrough marketing ideas for software companies that’ll help you propel your business’s…
53% of consumers say they’ll only buy from companies that are known for protecting customers’ data. Discover how to develop, maintain and operate trustworthy web applications. Toughen up your internal and external apps against attacks while balancing…
In 2021, the average public SaaS company had around 36,000 customers. What about your organization? If you’re interested in increasing the number of customers coming through your virtual door, you’ll need to implement powerful lead generation strategies…
Despite the glooming global economic outlook for 2023, Gartner’s gurus are forecasting $195 billion in end-user spending on SaaS. That represents a 16.8% year-over-year growth. Want a slice of the pie? Discover nine unbeatable SaaS marketing tips that’ll help you…
Local file inclusion (LFI), structured query language injection (SQLi), and cross-site scripting (XSS) — these three attack vectors were used in the majority of the 9+ billion web applications and API attacks in the first half of 2022.…
Observing software development best practices is crucial when your project is the next version of an existing application that has thousands or millions of users. You may not be aware that most projects are written using…
Tactics Cybercriminals Use to Hide or Mask Their Identity Cyber predators and cybercriminals aren’t like bad guys in movies and cartoons. They don’t go around on the internet with a flashing sign above them announcing, “I’m…
New users – if this is your first time purchasing a cloud signing product from us, check the email address entered during enrollment for a message from DigiCert. Create your password and follow this guide.
Existing users – if you’ve purchased a cloud signing certificate in this account before, you already have an account. We’ve update your DigiCert CertCentral account to allow another Code Signing Certificate request. Login to your account here.