Digital signatures (based upon strong cryptographic fundamentals) often take on a very different meaning and use, depending on who one talks to. While there has been a general push toward the increased usage of digital signatures, the full breadth of their power and capability often remain unknown.
In this one-hour webcast we will provide a brief over of the cryptographic systems that can be leveraged to create digital signatures and why we want to use these signatures (their importance). We will discuss the more common uses (such as digitally signed email) and then move into more recent examples of the power of digital signatures in areas such as DKIM (DomainKeys Identified Mail) as well as incident detection and response. Finally, we will conclude with a short discussion on how better to leverage the increasing power of digital signatures as a part of a robust information security program.