
- January 07, 2025
- Jaya Mehmie
Code Signing Certificate Validity Changes: What This Means For You
The maximum validity period for Code Signing Certificates is decreasing, but what does this mean for you? Discover more in our blog.
The maximum validity period for Code Signing Certificates is decreasing, but what does this mean for you? Discover more in our blog.
In the fast-paced world of enterprise security the right partner for your digital security needs is non-negotiable. Here’s why you should choose GlobalSign.
Businesses heavily rely on digital certificates, but being crypto-agile is essential to prevent disruptions and respond to threats.
Artificial Intelligence (AI) has become a transformative force across various industries, revolutionizing the way we live and work. From improving…
From 1 September 2023, the new CA/B Forum Baseline Requirements come into effect, are you ready? Read on to learn more
PKI For Businesses: With the progressive evolution of the internet, ensuring the security of businesses' online presence has become an increasingly…
Artificial Intelligence (AI) has become a transformative force across various industries, revolutionizing the way we live and work. From improving healthcare to optimizing transportation, AI's capabilities are awe-inspiring. However, amid the advancements, it is crucial to recognize and comprehend the potential dangers that accompany this powerful technology. This blog sheds light on the importance of understanding AI risks and explores six potential dangers of artificial intelligence.
From 1 September 2023, the new CA/B Forum Baseline Requirements come into effect, are you ready? Read on to learn more
PKI For Businesses: With the progressive evolution of the internet, ensuring the security of businesses' online presence has become an increasingly formidable task, owing to the relentless advancements in cyber threats. While the battle against cyber threats remains ongoing, the risk can be significantly mitigated by incorporating Public Key Infrastructure (PKI) into your business strategy. Now before we dive deeper, let us try to understand the meaning of a Public Key Infrastructure (PKI)?
Protect your website and customers' data with a paid SSL certificate from a trusted CA. Enhance security, boost trust, and improve SEO with strong SSL encryption.
Premium SSL/TLS certificates are cryptographic certificates that protect users' data when they visit your website. They offer numerous value-added benefits like warranty coverage, stronger encryption, trust indicators, and multiple levels of validation that free SSL certificates lack.
Certificate lifecycle management can be daunting, especially if you rely on traditional manual methods, but with certificate automation, you can eliminate inefficiencies and maximise your ROI. Certificate automation refers to the process of streamlining certificate issuance, renewal, revocation, and more.
March saw a number of healthcare cyberattacks, plus a ransom attack on Ferrari, a new cybersecurity strategy from the White House and more.
In this blog, we take a look at 3 common challenges that face IoT security.
In this blog, we explore how HashiCorp Vault can help enhance security in your DevOps pipelines.
Secure online transactions are ensured by the rule of e-commerce security. But why is it important, and what are the common threats? We explore in this blog.
Industrial IoT has become very attractive targets to cyber criminals, but how can you mitigate IIoT security challenges with PKI solutions? Discover how in this blog.
This article explores the definition and benefits of multi-layered security, along with how you can implement this approach.
Industrial IoT (IIoT) is evolving and defining Industry 4.0, but what are the benefits of reinforcing devices with strong security? We explore this and more.
We explore the five pillars which make up the National Cybersecurity Strategy from the White House, with the vision to a secure digitally-enabled future.
A brief introduction to the Cybersecurity Improvement Act, best practices and IoT adoption in the US Government.
Let’s take a look at the common cyber-attacks which take place in the Internet of Things (IoT).
In this article, we’ll look at what a Qualified Electronic Signature (QES) is and when and why you should sign with one.
The monthly round up of cybersecurity news, including DDoS, impacts of previous attacks, takedowns, close shaves and focus on the education sector and NATO.
The Internet of Things (IoT) is becoming increasingly essential in terms of assisting with product development and enhancements. It can also deliver significant benefits within the manufacturing…
The number of vulnerabilities to IoT devices is increasing. This article explores how protecting IoT devices can be more secure and make the internet safer.
The Internet of Things (IoT) is the network of internet-connected objects. In this article, we look at the history and the future of IoT.
What's the difference between SSL and TLS? And how do you know which one is right for you? Everything is explained in this blog.
Keep reading to find out more about the latest directive affecting the security industry in the EU. For a quick list of all the abbreviations scroll down to the PSD2 Glossary at the end of the post.
One of the common pitfalls a company might fall into is assuming that its cybersecurity solutions are maintained and managed via standard risk assessments.
GlobalSign conducted a survey earlier this year to better understand how, and why, companies are using Public Key Infrastructure (PKI) based certificates. Nearly 750 people participated in the survey,…
As a freelancer, balancing your need for privacy with your desire to get work can be difficult. Often, so many questions arise: Should you share personal information that can be used to identify you…
This has been another busy year for hackers. As for what we can expect in 2020, only time will tell. In the meantime, we’ve asked some of GlobalSign’s brightest minds to share their thoughts.
While getting people to trust online shopping was a huge hurdle for e-commerce 20 years ago, today’s online shoppers often think nothing of filling out forms and providing data.
If you don’t work in IT, chances are low you’ve come across the acronym “PKI.” You’re probably not familiar with the concept or – more likely – you’ve never even heard of it.
The personal records of nearly every single resident of Ecuador, including 6.7 million children - even infants -- were exposed due to a colossal data breach. That works out to
Building an online store should be an enjoyable and exciting experience, but there are serious issues that must be considered to ensure the business – and customers – are kept as safe as possible.…
Scams are an integral part of the online world. There are hundreds of different attack strategies used by cybercriminals. One of the classic scamming techniques is phishing. While an older strategy,…
There was no black out, but it could have been a DDoS attack...
Today there’s a huge wave toward protecting consumer privacy – in Congress, with the GDPR, etc. – but how can we protect user privacy on the web without establishing the identity of the websites that…
There’s no denying the crisis created by a sudden rise in automated phishing attacks. And it’s happening with more convincing content and greater accuracy due to Artificial Intelligence (AI), Machine…
IT is at the heart of operations for a majority of small businesses, so robust security measures are vital. For those just starting out, here are some top tips.
The role of facility managers is becoming challenging in modern-era facilities that are up to industry 4.0 standards. The implementation of tech on multiple levels and devices provides the opportunity…
Consider adding another layer of security to your network. Here’s a quick guide on everything you need to know about certificate-based authentication.
Know the impact of IoT or smart devices in the healthcare industry, its risks, and more in this blog.
Find out what are the basic ways to spot a secure website in this guide.
Need a document management and signing solution that is compliant to the FDA’s 21 CFR Part 11? In this blog, we’ll discuss how GMO Sign is compliant to the FDA’s 21 CFR Part 11.
Installing an SSL certificate is not as complicated as most think! Here’s a guide to help you walk through the installation process of TLS certificates.
How did the Internet evolve since its inception? What were the developments of PKI throughout the years that changed the way we communicate? All this and more in this blog.
Learn the basics of the Internet of Things (IoT), advantages and disadvantages, how PKI plays an important role in IoT security, and more in this blog.
What is certificate-based authentication and how can it improve your business’ cybersecurity posture? Know the answers and more in this blog.
Learn what important roles hardware security modules (HSM) play in encryption, the pros and cons of using one, and more in this blog.
Learn what is an electronic transaction, what processes can be considered as one, the regulations in the APAC region the govern it, and more in this blog.
Are electronic signing and digital signing the same? Know the difference between digital and electronic signature in this infographic.
Learn all about TLS handshakes and how to fix TLS handshake issues in this blog.
Learn what is SSL, what is SSH, and the key differences between the two.
Learn how to create and use electronic signatures on word, the pros and cons of using e-signatures, and what are the differences between them and digital signatures.