-
Download Now
How to Generate CSR on Exchange 2010 PowerShell
Tech Document from Sectigo
Tech Document Sep 25, 2018This article will go into detail on how to generate certificate signing request on Exchange 2010 PowerShell
-
Download Now
How to Generate CSR on Exchange 2007 (PowerShell)
Tech Document from Sectigo
Tech Document Sep 25, 2018This article will go into detail on how to generate certificate signing request on Exchange 2007 (PowerShell)
-
Download Now
How to Generate CSR on Microsoft Office Communications Server 2007
Tech Document from Sectigo
Tech Document Sep 25, 2018This article will go into details on how to generate certificate signing request on Microsoft Office Communications Server 2007
-
Download Now
How to Generate Certificate Signing Request on SBS 2008 / 2011
Tech Document from Sectigo
Tech Document Sep 25, 2018This article will go into detail on how to generate certificate signing request on SBS 2008 / 2011
-
Download Now
How to Generate ECC CSR on Microsoft Management Console
Tech Document from Sectigo
Tech Document Sep 25, 2018This article will go into detail on how to generate an ECC certificate signing request on Microsoft Management Console
-
Blog Post Sep 19, 2018
Upgrading Our Processes
Blogger Troy Hunt recently published a long missive in criticism of Extended Validation SSL, which includes a number of criticisms aimed at the Comodo brand in particular. Since the CA spun out of the larger Comodo Group, Inc. late last year we have been aggressively investigating all aspects of the business to identify where changes are required and to plan and implement them.
-
Blog Post Sep 11, 2018
Phishing Incident Statements
On September 11, 2018, a cybersecurity firm reported that it uncovered malicious code injected into the British Airways website, indicating that the hackers in the recent British Airways supply chain phishing attack made use of an increasingly common tactic of using large websites to embed pieces of code from third-party suppliers.
-
Blog Post Sep 10, 2018
DNS Poisoning Variant to Obtain a DV Certificate Unveiled
On September 6, 2018 The Register published an article describing how a team of academic security researchers successfully demonstrated that they could use a variant of DNS poisoning to obtain a Domain Validation (DV) certificate for a target domain they did not own.
-
Learn More
Word of the Day: EV Certificates
News Article from Sectigo
News Article Sep 04, 2018An EV SSL certificate (Extended Validation SSL certificate) is a digital identity authentication solution used by HTTPS websites to provide the highest level of security by verifying the identity of a website owner or operator.
EV SSL certificates assure consumers that they are conducting business through a trusted website and have become the industry standard for e-commerce websites.
-
Learn More
The Extended Validation Green Address Bar Matters, Here’s Why
Blog Post from Sectigo
Blog Post Aug 14, 2018When it comes to interacting online, everything is a matter of trust. Spam emails and clever phishing attacks make it more challenging to determine what’s legitimate and what isn’t, putting businesses and consumers on edge. Without trust, customers are reluctant to share sensitive information or conduct transactions online.
-
Learn More
TLS 1.3 Published by IETF
Blog Post from Sectigo
Blog Post Aug 13, 2018On Thursday, August 9 the IETF published TLS 1.3 as an approved standard, following its publication as a proposal in March 2018. TLS 1.3 offers important improvements in both security and connection speed, and adoption among software and service vendors is already well underway, including support in Chrome, Firefox, and Cloudflare.
-
Learn More
EV SSL Certificates for Online Business Are Worth the Time and Money
News Article from Sectigo
News Article Jul 19, 2018It’s widely understood that Extended Validation (EV) SSL certificates are a little bit costlier for online businesses in budget and implementation time than Domain Validation (DV) certificates. Even though the expense and effort needed for EV are trivial compared to other parts of the security stack, many businesses will go for the cheapest and easiest solution unless presented with a compelling reason to do otherwise.