This new partnership will accelerate development, increase the speed of innovation, and ensure continuous delivery of certificates for DevOps environments.
We expect the new CAA requirement to have a small impact on the security and complexity of the web, but we are happy it is an improvement with a low-cost process.
This vulnerability does not affect SSL/TLS certificates nor does it affect versions prior to OpenSSL 1.1.0.
The new User role gives you a better way to manage your team’s access to the correct certificates.
These vulnerabilities do not affect SSL/TLS certificates, but system admins should patch their 1.1.0 OpenSSL framework as soon as possible.
The policy change goes into effect October 2017. Learn what this means for DigiCert customers.
The “critical” vulnerability introduced in OpenSSL 1.1.0a does not affect SSL/TLS Certificates but admins should still patch their OpenSSL framework as soon as possible.
The vulnerabilities identified today do not affect SSL/TLS Certificates, but plan to patch your OpenSSL framework as soon as possible.
Follow us on Twitter (@DigiCert), retweet us, and you could win.