sponsored by Thawte Inc.
Posted:  30 Sep 2013
Published:  30 Sep 2013
Format:  PDF
Length:  11  Page(s)
Type:  White Paper
Language:  English

The efficiency of code signing as an authentication mechanism for software depends on the secure storage or code signing private keys used by software publishers. But a series of recent malware attacks using malicious programs signed with legitimate certificates shows that some developers don’t take sufficient precaution.

This paper describes recent security breaches and why they may have happened. It discusses best practices, especially for the Windows platform, which can help to safeguard the private keys associated with code signing certificates.

Authentication | Authorization | Certificate Authorities | Malware | Network Security | Physical Security | Public Key Encryption | Security Best Practices | Security Management | Security Threats

View All Resources sponsored by Thawte Inc.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement