- March 12, 2024
- Iris Jennifer Jo
Understanding Digital Connections: SSL in Hong Kong
In Hong Kong's digital landscape, secure online connections are essential as businesses and individuals rely more on the internet. An SSL/TLS…
In Hong Kong's digital landscape, secure online connections are essential as businesses and individuals rely more on the internet. An SSL/TLS…
AI & ML redefine digital identity security in 2024! Explore how these innovations fight fraud & protect you. Read our analysis & uncover the future of…
Not all SSL/TLS certificates are created equal! Many businesses have opted for free SSL/TLS certificates over paid versions. There is an obvious…
As Google recently released a new policy to degrade websites that utilize a SHA-1 Certificate in its user interface, it has become all the more important to take prompt action.
Questions and answers about our active directory integration that enables automatic certificate enrollment and deployment.
Answers to more questions from our digital signature webinar, including the software you need to apply digital signatures and how to apply them.
This blog includes a few questions and answers we didn't have a chance to cover in our recent digital signature webinar, including what does a recipient need to receive a signed document and who…
A walk through the simple steps it takes to apply a digital signature using one of the industry's leading PDF editing, markup, and collaboration software, BlueBeam Revu.
Security of a website and its infrastructure play a very important role in the trustworthiness of a site. The 2014 OTA Honor Roll helps promote SSL best practices.
OpenSSL published a security advisory highlighting six new vulnerabilities with fixes available.
Learn how an insurance firm wanted to switch from paper-based workflow to an electronic workflow to reduce the turnaround time for policy application and delivery!
Open source technologies and their contributions to computing and especially the internet, have been taken for granted for a long time – too long.
Read this blog for everything you need to know about how to upgrade to SHA-256 before SHA-1 is depreciated.
Just like you, over the past months, we have been watching the coverage on the Edward Snowden leaks. Each leak has provided unprecedented insights into both the capabilities and practices used by the…
Since launching our OneClickSSL technology, we have remained focused on further increasing the availability of the solution in hosting environments. We want the technology to be as easy to integrate…