Search results


How to Sign an APPX File with Codesign Secure

How to Sign an APPX File with Codesign Secure

Channel Logo
Jamie Willett, Consultant at Encryption Consulting

Welcome to our tutorial on signing an APPX file using Codesign Secure. In this video, we’ll walk you through the process of securely signing your application
and preparing the manifest for signing with a certificate. What You'll Learn: 1. Introduction to Codesign Secure: Understanding the benefits of using
Codesign Secure for code signing. 2. Preparing the APPX File: Step-by-step instructions for setting up your APPX file. 3. Altering the Manifest: How to modify …

Automation Showdown: Swimlane vs The Rest

Automation Showdown: Swimlane vs The Rest

Channel Logo
Bryon Page, Swimlane Field CTO

Automation and AI are hot topics; their need is obvious, and every cybersecurity vendor, from hyperautomation to SOAR to XDR or even SIEM, claims to have
what it takes to automate enterprise security operations. So what makes Swimlane Turbine different from other security “AI automation” platforms? Bring
your toughest questions about the AI automation vendor landscape and join Bryon Page, Swimlane Field CTO, for an honest look (we promise to leave the …

AI and open source coding- do the benefits outweigh the risks?

AI and open source coding- do the benefits outweigh the risks?

Channel Logo
Ivan Wallis, Allison Schuh

AI and open source code is making waves in the development world, providing teams with the ability to speed up their development process to keep pace
with the fast-paced digital economy. But at what cost - If security cannot keep up with development speeds, what risks are organizations putting themselves
in? With AI and open source code being heavily utilized, it is important to understand the current state of modern development and security and how to mi…

EC-Conference2024: Your Roadmap to Code-Signing Compliance

EC-Conference2024: Your Roadmap to Code-Signing Compliance

Channel Logo
Riley Dickens, Senior Consultant at Encryption Consulting

Explore the essential role of code-signing in regulatory compliance, covering key requirements like GDPR, HIPAA, and supply chain security. Learn how
code-signing protects software integrity and helps organizations meet compliance standards. This session will also highlight best practices for implementing
secure, automated code-signing processes and showcase real-life success stories from companies that have effectively used code-signing to streamline op…

Securing The Enterprise with Code Signing Strategies for Protecting Client Data and Enhancing Trust

Securing The Enterprise with Code Signing Strategies for Protecting Client Data and Enhancing Trust

Channel Logo
Riley Dickens from Encryption Consulting, Surbhi Singh from Encryption Consulting

Join us to explore the critical role of code signing in enterprise cybersecurity strategies. Learn how code signing enhances trust, protects customer data, and
protects brand integrity through secure software validation. With the rapid growth of digital signing driven by regulatory requirements and the rising need for
security measures, it’s important to protect your organization from cyber threats. Our webinar will share insights on the impact of cyber incidents, effective…

Securing the Software Supply Chain with Code Signing

Securing the Software Supply Chain with Code Signing

Channel Logo
Riley Dickens from Encryption Consulting

In this webinar, Riley Dickens - a consultant with Encryption Consulting, will explore the benefits of code signing and how it can be used to secure the software
supply chain. He will discuss the different types of code-signing certificates available and how they can be used to sign various types of software, including
executables, drivers, and scripts. He will also cover best practices for implementing code signing in your organization and how to manage your code signing…

Best practices for developing Scripted Decision Nodes with Christian Brindley

Best practices for developing Scripted Decision Nodes with Christian Brindley

Channel Logo
Christian Brindley, Distinguished Technical Consultant, Ping Identity

Looking to deliver robust, consistent code that’s easy to maintain? Then join us on our upcoming developer webinar to discover how PingAM and PingOne
Advanced Identity Cloud allow you to implement custom logic in user journeys through the Scripted Decision Node. In this webinar, Christian Brindley, a
Distinguished Technical Consultant at Ping Identity is going to explore best practices for developing scripted nodes, in order to deliver robust, consistent and…

Introduction to CodeSign Secure

Introduction to CodeSign Secure

Channel Logo
Jamie Willett

Get a complete introduction to Codesign Secure and it's key features. Learn more about how CodeSign Secure ensures your software's authenticity and
integrity with advanced encryption, user-friendly interface, multi-platform support, automated processes, and real-time monitoring.

Integrating Secure Code Signing in the CI/CD Pipeline

Integrating Secure Code Signing in the CI/CD Pipeline

Channel Logo
Ryan Sanders, Sr. Dir Product & Customer Mktg & Eric Mizell, VP of Field Engineering Keyfactor; Brandon Dunlap, Moderator

Code signing is a powerful method to protect the integrity of containers, artifacts, and software across the continuous integration and continuous deployment
(CI/CD) pipeline. However, signing is more than just certificates and signatures. It’s about integrating the sign and verify process into your pipeline while
keeping sensitive keys secure and in the right hands. If signing processes aren’t secure, it opens the door to malware, exploits, and supply chain attacks. On…

Integrating Secure Code Signing in the CI/CD Pipeline

Integrating Secure Code Signing in the CI/CD Pipeline

Channel Logo
Ryan Sanders, Director of Product Marketing Eric Mizell, VP Field Engineering

Code signing is a powerful method to protect the integrity of containers, artifacts, and software across the CI/CD pipeline. But signing is more than just
certificates and signatures. It’s about integrating the sign and verify process into your pipeline while keeping sensitive keys secure and in the right hands. If
signing processes aren’t secure, it opens to door to malware, exploits, and supply chain attacks. Join Eric Mizell, VP of Solutions Engineering, and Ryan Sand…