
Preparing for the Quantum Leap: PQC Code Signing in a CNSA 2.0 World
As we stand on the brink of a new era in cybersecurity, the threat posed by quantum computing is no longer a distant possibility, it’s

As we stand on the brink of a new era in cybersecurity, the threat posed by quantum computing is no longer a distant possibility, it’s

Post-Quantum Cryptography and the Future of Secure Code Signing Imagine a future where quantum computers can break the encryption that keeps our digital world secure.

Effective June 1st of this year, the new CA/Browser Forum code signing requirements go into effect. As a result, publicly trusted Certificate Authorities (CA) will

In this post, learn more about satisfying the requirements of three new frameworks for securing the software supply chain: Google’s SLSA Framework, Microsoft’s SCIM Framework, and CNCF’s Software Supply Chain Best Practices.

This post describes security controls that an enterprise can deploy to prevent and detect attackers who are attempting to insert malware into a software’s code base.

To ensure strong security, a code signing system must verify that the code being signed precisely matches the code in the repository. In this post, learn how to deploy such a system using a technique known as automated hash validation.

Businesses need a secure code signing system that doesn’t reduce the tempo of day-to-day operations. Learn how to design it in this post.