• The Trinity of Security in IoE

    December 02, 2015

    Connected devices, Internet of Things, Internet of Everything are all coming. One way or another our every day utilities and devices we use will be connected to the Internet for one reason or another.…

  • Flexible Identity Authentication Solution for IoT

    November 25, 2015

    Identity authentication is the most fundamental qualification for all of the things connecting to the Internet. Read the blog to learn more about connecting to IoT securely.

  • Building Secure IoT Ecosystems from the Top Down

    November 17, 2015

    With a wide variety of approaches out there for how to identify devices, and also how devices authenticate into services, this blog explains how to build a secure IoT ecosystem from the Top Down. Read…

  • From a Cookie to a Customer

    November 11, 2015

    Identity and Access Management (IAM) can help in the ecommerce conversion process. Using an Identity Provider with multiple supported authentication methods allows visitor to choose their preferred…

  • Chrome Changed How it Displays Mixed Content Issues

    October 28, 2015

    Recent changes to how Chrome displays mixed content issues will be easier for consumers. Read this blog to learn more about these changes and how they may affect your SSL sites.

  • How to Fix Mixed Content Warnings on your SSL Website

    October 28, 2015

    Visitors to sites protected by SSL expect (and deserve) security and protection. When a site doesn’t fully protect or secure all content, a browser will display a “mixed-content” warning. Read this…

  • Are you Security Serious?

    October 21, 2015

    At GlobalSign we’re all about promoting security and making it as easy and accessible as possible for our customers. This is something that the founders of Security Serious week also believe in and…

  • EV Code Signing for Windows 10

    October 19, 2015

    We’re pleased to announce that GlobalSign Extended Validation (EV) Code Signing Certificates can now be used to sign kernel-based modules in the Windows Hardware Developer Center Dashboard Portal.

  • New SHA 1 weaknesses reported

    October 15, 2015

    A collaborative security group has announced successful "Freestart Collisions" on SHA-1 (https://sites.google.com/site/itstheshappening/). While this type of collision doesn't directly lead to full…

  • Private Key Protection

    September 30, 2015

    We look at ways you can protect your private key from falling into the wrong hands. Many software developers are not sufficiently protecting the environments and simply store them on a local machine.

  • A Cure for the Healthcare Identity Crisis

    September 30, 2015

    A recent article on cio.com stated that healthcare organizations are three times more likely to be a target of data theft. With a majority of patient data now in electronic record formats, there are…

  • Cybersecurity Scrutiny now on Financial Firms

    September 23, 2015

    As an extension of the Securities and Exchange Commission’s March 2014 Cybersecurity Roundtable, OCIE’s Cybersecurity Examination will continue to shine intense scrutiny around Broker and Dealers…

  • Best Practices for Securing Electric Utilities and Safeguarding the National Grid

    September 09, 2015

    NCCOE Releases NIST Cybersecurity Best Practices for Identity Access Management. NIST, the utility user community, and the vendor community worked together to implement an example Identity and Access…

  • Identity Management and Cost Savings

    September 02, 2015

    For companies trying to move from costly manual processes to automated processes, the challenge is often that they cannot rely on a single category or issuer of digital identities. To reach their…

  • Enabling SSL by default in the Cloud – 3 questions answered

    September 01, 2015

    If you are a cloud provider, the deployment of SSL security is bound to have come up in discussion. The industry is moving towards encryption by default, and the larger your client base, the more…