Thomas Thurman
Recent Posts
-
What is BIMI? Brand Indicators for Message Identification Explained
November 25, 2025Learn how BIMI works, why it matters for brand trust, and how Mark Certificates bring your logo into…
-
Spoofing Attacks Explained - Types, Risks, and How to Stop Them
October 23, 2025Email is more vulnerable than ever, and spoofing is one of the leading ways that attackers are…
-
What If Encryption Didn’t Exist?
October 20, 2025Imagine a world without encryption. This blog explores why encryption is essential, what changes are…
-
IT Stress and the Certificate Crunch: Finding Calm with Automation
October 10, 2025IT teams face mounting stress from constant certificate renewals, outages, and compliance risks.…
-
DevOps vs. DevSecOps: What’s the Difference and Why Security Can’t Wait
September 29, 2025Discover the key differences between DevOps and DevSecOps—and why integrating security early is…
-
Shorter SSL/TLS Certificates are the Key to Preparing for Post-Quantum Cryptography
September 15, 2025Short-lived SSL/TLS certificates are key to crypto-agility and quantum readiness. Learn how 47-day…
-
Inside the CA/B Forum – The Force Shaping Internet Trust
September 11, 2025Discover how the CA/B Forum shapes internet trust, from SSL/TLS changes to post-quantum readiness.…
-
The Hidden Risk in Your Certificates—And Why Automation Can’t Wait
September 02, 2025SSL / TLS certificate lifespans are shrinking fast, manual management won’t keep up. Learn why…
-
What is Domain Control Validation (DCV) and Why it’s Essential to SSL/TLS Certificates
August 27, 2025Learn how Domain Control Validation (DCV) works, it’s role in SSL/TLS security, and what it means…
-
What are SPF, DKIM, and DMARC?
August 18, 2025A detailed guide to SPF, DKIM, and DMARC; how they work together to protect email, prevent spoofing,…
-
How to Protect Against the 91% of Cyber-attacks Targeting Inboxes
August 14, 2025A deep dive into why email remains the top cyber-attack vector and how to protect against phishing,…
-
Brand Trust Starts with Security: 5 Tips Every Marketer Should Know
August 12, 2025Discover how marketers can build brand trust through digital security. Learn 5 essential tips,…
-
Code Signing Explained: The Importance of Code Security
May 13, 2025Discover the importance of Code Signing and how it ensures integrity, authenticity, and security in…
-
SSL vs TLS - What's the Difference?
April 24, 2025Understand the key differences between SSL and TLS, including stronger encryption, improved…
-
4 Best Practices to Boost Your Cybersecurity Strategy
April 23, 2025Discover 4 essential practices to enhance your cybersecurity strategy and protect your business from…
-
9 Steps to Streamline Your Certificate Management
April 23, 2025Explore how automating certificate management can save costs and boost efficiency. Get a…
-
How Governments Can Secure Digital Identities for Efficiency and Sustainability
March 03, 2025Discover how PKI enhances digital identity security for governments, boosting efficiency, reducing…
-
Safeguarding Your Digital Identity Year-Round
January 28, 2025Learn how to safeguard your digital identity year-round with essential data protection tips and…
-
7 PKI and Cybersecurity Trends for 2025
December 03, 2024As we wrap up 2024, it’s time to look forward into 2025 and see what to expect from the PKI industry…
-
Cyber Criminals Don't Take Time Off, You Need a Solution That Doesn't Either
November 29, 2024During the holiday periods, cyber threats are larger than ever – find out how to protect your…
-
Applying Signatures and Seals for Education in a Digital Age
October 17, 2024With education increasingly becoming an online affair, institutions need to start securing their…
-
Protect IoT Devices and Supply Chains from Emerging Threats
October 09, 2024Advanced architectural models for certificate protection are emerging that are designed to safeguard…
-
What is Business Email Compromise and How to Prevent It
September 26, 2024In these days of constant impersonal email communication, BEC has become a common threat. To…
-
Securing the Pipeline: How PKI Supports Secure DevSecOps Environments
September 18, 2024Securing your DevOps pipeline is crucial for a smooth development cycle that maintains…
-
5 Best Practices for Effective Employee Cybersecurity Education
September 12, 2024Keeping your organization safe starts with your employees, learn how to make sure they’re equipped…
-
What is an IoT Gateway and How Do I Keep it Secure?
August 27, 2024Learn how to better manage your IoT devices across a fleet of identities using IoT gateways, and how…
-
The Power and Importance of Digital Signatures
August 22, 2024Learn what makes digital signatures so useful for securing and streamlining enterprises, and why you…
-
What Is the CA/Browser Forum and What Is Its Role in Internet Security?
August 15, 2024The CA/Browser Forum dictates of the way digital security is managed through its governance of…
-
Enabling Secure Innovation for DevOps
June 19, 2024Looking to secure your DevOps pipelines? Learn how to use PKI to innovate your development cycles…
-
What is S/MIME and How Does it Work?
June 05, 2024In this article we explain the concept behind S/MIME, how it works, and how you can start using it.
-
Beyond the Key: Strategies for Improving Password Security
May 02, 2024This World Password Day, we’re taking a look at how password security has evolved, and what steps…
-
An Overview of Digital Signatures: Answering Our Frequently Asked Questions
April 18, 2024What types of digital signatures are there and how are they used? This blog answers all your FAQs…
-
Efficiency Unleashed: Exploring Automation in IoT Devices
April 04, 2024Explore the synergy of IoT automation and PKI security, enhancing device efficiency and endpoint…
-
Beyond the Basics: Why Premium Support is Essential for Maximizing the Potential of Your PKI Infrastructure
March 21, 2024This blog will look at what premium support offers over standard support, and what those elevated…