Enterprise Cryptographic Services
Does this sound familiar? You are working at a company on a big project and are just about ready to move to production but need
Check out the latest cybersecurity posts from Garantir on topics like key management, secure software development, code signing, privileged access management (PAM), and more.
Does this sound familiar? You are working at a company on a big project and are just about ready to move to production but need
What Time is it? In a previous post we mentioned the importance of using cryptographic timestamping to avoid issues related to expiring and, in some
Revoking a certificate invalidates a certificate before its scheduled expiration date. There are many reasons to revoke a certificate including, but not limited to, compromise
Effective June 1st of this year, the new CA/Browser Forum code signing requirements go into effect. As a result, publicly trusted Certificate Authorities (CA) will
Over the past few years container adoption has grown rapidly. With it has grown the need to sign container images to help prevent supply chain attacks. The standards and tools to sign images have evolved over the years, and can still be a bit tricky to navigate for those new to container signing. This post will provide a brief background on some of the tools and standards, the pros and cons of each, and some best practices to follow when signing in your environment.
Recently, the popular NPM package ua-parser-js was compromised by attackers. At least three malicious versions of the software were released by attackers with capabilities including
1041 Market Street #302
San Diego, CA 92101
(858) 751-4865
info@garantir.io
Copyright © 2023 Garantir LLC. All Rights Reserved.