- April 25, 2024
- Carla Mendoza
Optimize Cybersecurity; Avert Wasted Revenue Potential
In terms of potential business revenue, find the real value in raising cybersecurity investments through solution upgrades and new technology…
In terms of potential business revenue, find the real value in raising cybersecurity investments through solution upgrades and new technology…
In Hong Kong's digital landscape, secure online connections are essential as businesses and individuals rely more on the internet. An SSL/TLS…
AI & ML redefine digital identity security in 2024! Explore how these innovations fight fraud & protect you. Read our analysis & uncover the future of…
As Information Technology and Operational Technology for the Industrial Internet become more aligned, our Product Manager, Nisarg Desai explores their place in the IloT.
Passwords just aren't reliable enough anymore. Certificate-based authentication is an efficient way to solve the problem of passwords in an organization.
Govind Yadav, Senior Sales Engineer demystifies email security and shares a demo showing how easy it is to create a fake email address.
Linus Hallberg, Head of Tier 3 Technical Support, explains what a PKCS#12 or .pfx file is and shares guides on installing a PKCS#12 on different operating systems.
Regional Product Manager for GlobalSign, Kimberly Johnson looks at Client Authentication through GlobalSign's Auto-Enrolment Gateway.
Identity authentication is the most fundamental qualification for all of the things connecting to the Internet. Read the blog to learn more about connecting to IoT securely.
With a wide variety of approaches out there for how to identify devices, and also how devices authenticate into services, this blog explains how to build a secure IoT ecosystem from the Top Down. Read…
Identity and Access Management (IAM) can help in the ecommerce conversion process. Using an Identity Provider with multiple supported authentication methods allows visitor to choose their preferred…
Visitors to sites protected by SSL expect (and deserve) security and protection. When a site doesn’t fully protect or secure all content, a browser will display a “mixed-content” warning. Read this…
Recent changes to how Chrome displays mixed content issues will be easier for consumers. Read this blog to learn more about these changes and how they may affect your SSL sites.
At GlobalSign we’re all about promoting security and making it as easy and accessible as possible for our customers. This is something that the founders of Security Serious week also believe in and…
We’re pleased to announce that GlobalSign Extended Validation (EV) Code Signing Certificates can now be used to sign kernel-based modules in the Windows Hardware Developer Center Dashboard Portal.
A collaborative security group has announced successful "Freestart Collisions" on SHA-1 (https://sites.google.com/site/itstheshappening/). While this type of collision doesn't directly lead to full…
We look at ways you can protect your private key from falling into the wrong hands. Many software developers are not sufficiently protecting the environments and simply store them on a local machine.
A recent article on cio.com stated that healthcare organizations are three times more likely to be a target of data theft. With a majority of patient data now in electronic record formats, there are…