We’ll break down how to sign your EXE files to make them more trustworthy for users As a software developer, you likely know the lifecycle of developing software and are well acquainted with the challenges that come with them. This includes everything from errors and…
Blogging About Everything Software Security – Threats, Updates, Best Practices, Tips, & More
Software touches the everyday lives of billions of people around the world. They rely on us (the software industry) to deliver dependable, safe applications for them to use. This blog is dedicated to working together to do our part to make the (software) world a better place…one piece of software at a time!
You can’t be too careful when it comes to the security of your applications. Put these 10 best practices to use to keep your business safe Cybersecurity has become an increasingly hot topic in the business…
$6.9 billion: so high are the latest FBI’s estimated potential losses from cybercrime in 2021. Discover how security as a code can help you and your organization prevent breaches, improve security operations, and survive the age of cyber…
Discover one of the most effective ways to check the integrity of signed executables downloaded from the internet. Learn how to check MD5 checksums and protect your device from harmful downloads Infected executables are one of…
Say no to risky downloads! Learn how to verify the checksum of a downloaded file in 5 easy steps to ensure that the file is malware free and legitimate. Discover how comparing checksums can give you…
Discover the world of cryptographic checksums. Learn about their meaning, the magic behind them, how to use them, and what their key role is in data integrity and cybersecurity Historically, the only way to install new…
Get verified: discover how to become a verified publisher with Microsoft. Learn how to boost customer trust, revenue and adoption of your products while protecting your organization from data breaches and malware Over the last couple…
Add some hash to your data! Explore four flavors of one of the key ingredients of effective cybersecurity in this hash algorithm comparison article. Learn about their distinct properties and characteristics, and how they can make…
Beef up your data protection security with the most secure hashing algorithm. Learn how a one-way function can unlock your ability to truly excel in cybersecurity, protecting your sensitive data with virtually irreversible and unique hashes…
This five-step guide provides a quick overview of how to use OpenSSL to generate a CSR for your digital certificates to secure your website or code OpenSSL allows you to generate a certificate signing request (CSR)…
42% of cybersecurity professionals interviewed by Cisco consider the growing number of application vulnerabilities one of their top concerns. Discover how to take your software development life cycle to the next level by joining the secure SDLC…
Creating a certificate signing request (CSR) is the first step to get a code signing certificate. Here are step-by-step instructions to quickly generate a CSR with the DigiCert Certificate Utility A code signing certificate CSR —…
This step-by-step guide will walk you through how to install a .pfx certificate on Windows 10 Certificate Manager (i.e., how to import a .pfx certificate file). This process works for importing code signing certificates as well…
This brief guide introduces you to Windows 10 Certificate Manager. This tool allows you to view and manage installed digital certificates on Windows devices as well as view CRLs and CTLs as well When you install…
Scan before you click! Discover the best free safe download checkers you need to try right now. We’ll cover what tools you can use to protect your devices from security threats when downloading files, software, and…
Discover how a small change in word order can make a difference to your organization’s security strategy in software development by enabling you to deliver secure, high-quality software faster With the number of security attacks skyrocketing and software…