In 2022, 33% of newly discovered vulnerabilities were flagged as critical or high. Explore OWASP’s secure coding practice checklist and learn how to leverage its power to boost your threat protection and reduce attack risks Digitalization is both a blessing and a curse for organizations.…
Blogging About Everything Software Security – Threats, Updates, Best Practices, Tips, & More
Software touches the everyday lives of billions of people around the world. They rely on us (the software industry) to deliver dependable, safe applications for them to use. This blog is dedicated to working together to do our part to make the (software) world a better place…one piece of software at a time!
74% of security incidents Sophos analyzed in 2021 were based on PowerShell. Don’t skimp on security — arm yourself with information! Here are nine easy ways to protect your PowerShell scripts against cyber threats to make your…
In 2021, PowerShell was the number one attack vector with 35% of organizations impacted. The solution? Code signing your scripts. Discover how to activate world-class security and protect your PowerShell scripts with a code signing certificate…
Do you need a code signing certificate to test an application and you don’t want to fork out money to buy one? Learn how to use PowerShell to create a self-signed certificate with a private key.…
Errare humanum est: To err is human. With organizations managing more than 50,000 certificates, it’s easy for one to slip through the net. And the consequences can be rough. Don’t bury your head in the sand.…
Did you know that code signing is included in MITRE’s attack mitigation solutions list? If so, great. But if not, read on to become a code signing sensei. Discover how to sign an exe like a pro in five…
Discover the meaning of this security message and how you can reduce its negative impact. Boost your downloads and give your customers peace of mind by confirming that your software is genuine and it’s really coming…
34 new startups joined Crunchbase’s “Stable of Unicorns” only in May 2022. Is your unicorn going to win the race and be next? Discover the perfect mix of B2B marketing channels that’ll help you crush your business…
With big names like IBM increasing their offering of software-as-a-service (SaaS), standing out in the SaaS market is becoming a real challenge. Discover nine winning strategies that’ll enable you to build the perfect offensive to help you…
Become a rock star Java developer. Learn how to improve your coding for the most sought-after job role in 2022. Discover how to give a security boost to your Java programs and to your career by…
“Person[] software_Developers_who_FollowProgrammingBestPractices;” What’s wrong with this variable name? Find it out in our ultimate programming best practices guide. Discover how to get a better developer experience, write clear software, and ace your coding skills. Awaken the geek…
According to Fortinet’s report, 80% of organizations worldwide suffered one or more data breaches due to a lack of cyber security skills and/or awareness. Do you have the right know-how to avoid this happening to your company? Find…
7ec70902b313dd171b99870be4e2253a. Do you want to know how a hash function transformed the foreword to OWASP Mobile application security verification standard (MASVS) book in that gibberish, short line? Find it out in simple terms, and learn how the same…
Knowing how to hash a file is as easy as 1-2-3 — quite literally, in this case. We’ll show you how to hash your files in just three easy steps in Windows Command Line When you…
Had enough of reading endless articles on marketing plans and getting nowhere on creating yours? Learn in just 5 minutes how to write an effective marketing plan for software products that’ll help you turn your business…
With more than 71,000 startups in the U.S. alone, positioning your new business in the market can be tough. Discover the “secret sauce” for a killer marketing strategy that’ll help you crush the competition and increase…
New users – if this is your first time purchasing a cloud signing product from us, check the email address entered during enrollment for a message from DigiCert. Create your password and follow this guide.
Existing users – if you’ve purchased a cloud signing certificate in this account before, you already have an account. We’ve update your DigiCert CertCentral account to allow another Code Signing Certificate request. Login to your account here.