We expect the new CAA requirement to have a small impact on the security and complexity of the web, but we are happy it is an improvement with a low-cost process.
This vulnerability does not affect SSL/TLS certificates nor does it affect versions prior to OpenSSL 1.1.0.
The new User role gives you a better way to manage your team’s access to the correct certificates.
These vulnerabilities do not affect SSL/TLS certificates, but system admins should patch their 1.1.0 OpenSSL framework as soon as possible.
The policy change goes into effect October 2017. Learn what this means for DigiCert customers.
The “critical” vulnerability introduced in OpenSSL 1.1.0a does not affect SSL/TLS Certificates but admins should still patch their OpenSSL framework as soon as possible.
The vulnerabilities identified today do not affect SSL/TLS Certificates, but plan to patch your OpenSSL framework as soon as possible.
Follow us on Twitter (@DigiCert), retweet us, and you could win.
A week full of health IT talk and exciting announcements brought thousands to Las Vegas, Nevada for HIMSS 2016.