Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

3/13/2013
12:06 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

GlobalSign Is First Certificate Authority To Support IPv6

Provides all certificate revocation status services over IPv6

Boston, MA – March 13, 2013 - GlobalSign (www.globalsign.com), the enterprise SaaS Certificate Authority (CA), today has announced that it is the first Certificate Authority to provide all Certificate revocations status services over IPv6. This is an important step for the SSL ecosystem, as revocation status services underpin the base security system providing trust to the Internet.

The current version of the Internet Protocol (IPv4) used to route traffic across the Internet has only a finite number of unique IP addresses. The explosive growth of applications and devices requiring unique IP addresses will result in a near-term exhaustion of IP addresses. As the successor to IPv4, IPv6 resolves this issue by using longer 128-bit addresses, adds additional security layers, and is critical to the Internet's continued growth.

Many major organizations have already shown their commitment to enabling IPv6 through initiatives like World IPv6 Day in 2012 (http://www.worldipv6launch.org/participants/). Furthermore, from September 2012 all U.S. government federal agencies were required to have their public-facing services reachable over IPv6.

GlobalSign has taken a strong leadership stance within the CA industry to accommodate the needs of both government agencies and other organizations that have upgraded their websites to support IPv6.

"We are proud to be the first CA to offer revocation status services that are IPv6 compliant," said Ryan Hurst, CTO of GlobalSign. "Making investments to support the evolving requirements of the Internet is an important part of GlobalSign's philosophy to not just be an SSL provider but a security partner. Organizations that work with GlobalSign benefit from a partner that understands the changing nature of the modern Internet and that IPv6 has now become the new norm."

All GlobalSign SSL Certificates are currently available and enabled for IPv6 at no additional charge to the customer.

For further information about IPv6, revocation checking and industry reports on IPv6 support, please visit https://revocation-report.x509labs.com.

About GMO GlobalSign

GlobalSign has been a trust service provider since 1996. Its focus has been, and always will be, on providing convenient and highly productive PKI solutions for organizations of all sizes. Its core Digital Certificate solutions allow its thousands of authenticated customers to conduct SSL secured transactions, data transfer, distribution of tamper-proof code, and protection of online identities for secure email and access control. Vision and commitment to innovation led to GlobalSign being recognized by Frost & Sullivan for the 2011 Product Line Strategy Award. The company has local offices in the US, Europe and throughout Asia. For the latest news on GlobalSign visit www.globalsign.com or follow GlobalSign on Twitter (@globalsign).

GMO Internet Group

GMO Internet Group is a comprehensive provider of industry-leading Internet solutions including domain name registration, cloud-based and traditional hosting, ecommerce, security, and payment processing services that each hold the top share of their respective markets in Japan. Other key business areas for the Group include online securities/FX trading, Internet advertising, search engine marketing and online research, and smartphone game development and publishing. GMO Internet, Inc. (TSE: 9449) is headquartered in Tokyo, Japan. Please visit http://www.gmo.jp/en for more information.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
The Cold Truth about Cyber Insurance
Chris Kennedy, CISO & VP Customer Success, AttackIQ,  11/7/2019
6 Small-Business Password Managers
Curtis Franklin Jr., Senior Editor at Dark Reading,  11/8/2019
Black Hat Q&A: Hacking a '90s Sports Car
Black Hat Staff, ,  11/7/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprise
Assessing Cybersecurity Risk in Today's Enterprise
Security leaders are struggling to understand their organizations risk exposure. While many are confident in their security strategies and processes, theyre also more concerned than ever about getting breached. Download this report today and get insights on how today's enterprises assess and perceive the risks they face in 2019!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-18862
PUBLISHED: 2019-11-11
maidag in GNU Mailutils before 3.8 is installed setuid and allows local privilege escalation in the url mode.
CVE-2019-18853
PUBLISHED: 2019-11-11
ImageMagick before 7.0.9-0 allows remote attackers to cause a denial of service because XML_PARSE_HUGE is not properly restricted in coders/svg.c, related to SVG and libxml2.
CVE-2019-18854
PUBLISHED: 2019-11-11
A Denial Of Service vulnerability exists in the safe-svg (aka Safe SVG) plugin through 1.9.4 for WordPress, related to unlimited recursion for a '<use ... xlink:href="#identifier">' substring.
CVE-2019-18855
PUBLISHED: 2019-11-11
A Denial Of Service vulnerability exists in the safe-svg (aka Safe SVG) plugin through 1.9.4 for WordPress, related to potentially unwanted elements or attributes.
CVE-2019-18856
PUBLISHED: 2019-11-11
A Denial Of Service vulnerability exists in the SVG Sanitizer module through 8.x-1.0-alpha1 for Drupal because access to external resources with an SVG use element is mishandled.