
- January 07, 2025
- Jaya Mehmie
Code Signing Certificate Validity Changes: What This Means For You
The maximum validity period for Code Signing Certificates is decreasing, but what does this mean for you? Discover more in our blog.
The maximum validity period for Code Signing Certificates is decreasing, but what does this mean for you? Discover more in our blog.
In the fast-paced world of enterprise security the right partner for your digital security needs is non-negotiable. Here’s why you should choose GlobalSign.
Businesses heavily rely on digital certificates, but being crypto-agile is essential to prevent disruptions and respond to threats.
Artificial Intelligence (AI) has become a transformative force across various industries, revolutionizing the way we live and work. From improving…
From 1 September 2023, the new CA/B Forum Baseline Requirements come into effect, are you ready? Read on to learn more
PKI For Businesses: With the progressive evolution of the internet, ensuring the security of businesses' online presence has become an increasingly…
Artificial Intelligence (AI) has become a transformative force across various industries, revolutionizing the way we live and work. From improving healthcare to optimizing transportation, AI's capabilities are awe-inspiring. However, amid the advancements, it is crucial to recognize and comprehend the potential dangers that accompany this powerful technology. This blog sheds light on the importance of understanding AI risks and explores six potential dangers of artificial intelligence.
From 1 September 2023, the new CA/B Forum Baseline Requirements come into effect, are you ready? Read on to learn more
PKI For Businesses: With the progressive evolution of the internet, ensuring the security of businesses' online presence has become an increasingly formidable task, owing to the relentless advancements in cyber threats. While the battle against cyber threats remains ongoing, the risk can be significantly mitigated by incorporating Public Key Infrastructure (PKI) into your business strategy. Now before we dive deeper, let us try to understand the meaning of a Public Key Infrastructure (PKI)?
Protect your website and customers' data with a paid SSL certificate from a trusted CA. Enhance security, boost trust, and improve SEO with strong SSL encryption.
Premium SSL/TLS certificates are cryptographic certificates that protect users' data when they visit your website. They offer numerous value-added benefits like warranty coverage, stronger encryption, trust indicators, and multiple levels of validation that free SSL certificates lack.
Certificate lifecycle management can be daunting, especially if you rely on traditional manual methods, but with certificate automation, you can eliminate inefficiencies and maximise your ROI. Certificate automation refers to the process of streamlining certificate issuance, renewal, revocation, and more.
The education sector is vulnerable to cyber-attacks. Learn how institutions can manage digital security with limited budget and resources.
Electronic Signatures and Digital Signatures are terms often used interchangeably but join us as we explore everything you need to know about each type.
eIDAS 2.0 is gradually coming into effect, let’s break down the important updates related to the definition of electronic signatures.
The more data you acquire, the more encryption keys you need and the more important it becomes to protect them.
In this blog, we discuss the (evolving) requirements for S/MIME and the attempt to create a standard.
Learn how to safeguard your digital identity year-round with essential data protection tips and insights from a leading Certificate Authority.
An insight into the discussion between Dave Birch, Andreas Brix and Maxwell Chen around the future of digital identity and security in finance.
Understanding FERC’ order No. 676-K, updates to WEQ-012 and how to best select the right Certificate Authority (CA) for your needs.
Businesses heavily rely on digital certificates, but being crypto-agile is essential to prevent disruptions and respond to threats.
Learn out how GlobalSign works with Quantum PKI to bring businesses the most effective solution for their unique requirements.
The maximum validity period for Code Signing Certificates is decreasing, but what does this mean for you? Discover more in our blog.
In the fast-paced world of enterprise security the right partner for your digital security needs is non-negotiable. Here’s why you should choose GlobalSign.
Join us for our final NewScam of 2024 as we unpack the biggest stories of the month including a major telecoms hack, a costly crypto heist and more!
Explore digital certificates in DevOps, their role in CI/CD pipelines, and best practices for automating secure certificate management.
Explore how IoT network security begins with secure device enrolment and how industry leaders must prioritize IoT security.
Security-by-design isn’t a new concept. It’s the idea of addressing security concerns, considerations and best practices as early as possible in the IoT product, application or network development to…
Together, GlobalSign IoT and Xage Security deliver the ultimate in secure IIoT. The partnership illustrates the novel and successful combination of two distinct technologies and makes obsolete the…
The ramifications of individual cybersecurity breaches can be devastating. According to a recent article in Threatpost, the average...
In this article we will explain how the Bitcoin Blockchain represents a new class of systems and protocols that are able to store value, pursue a brief inquiry into value...
Human error is one of the top three causes of data breaches, could the gamification of the cyber security training process help businesses to defeat this enemy?
At GlobalSign, everything we do is focused on one thing – protecting identities. So when tax season rolls around next week (April 15), we’re acutely aware how fraud can turn into a nightmare during…
We like to laugh at scams. Once exposed, security risks that fooled thousands turn into stories of “Who could have fallen for that?”
These ransomware attacks may have funny names, but the consequences are no laughing matter.
While no easy task, there are a few steps that app development companies can take up front to make the process easier.
Smart Cities, made possible by the rapid advancement of connected devices, software systems and information communications technologies are helping in the urbanization...
At the show, GlobalSign’s Technology Partner Manager, Mike Boyle, and Sebastian Schultz, Sales Engineer will take a look into PKI and the need for Crypto Agility...
Strong, unique identities are the core of IoT device security. Giving unique identities allows them to be authenticated when they come online and throughout the lifetime. It proves integrity and…
Well, it’s that time of year again. The time when cybersecurity’s best and brightest come together in San Francisco to share our latest thoughts, ideas and wares on combating and managing the scourge…
We’ve all heard of consumer IoT device breaches leading to unnerving situations and events. But when breaches happen to industrially connected IoT devices and systems, the consequences are…
Predictions aren't easy, especially in the chaotic world of cybersecurity. The threat landscape is ever-growing, all thanks to offensive and defensive technologies and nation-state attacks emerging at…
With cybercrime all around, businesses should invest correctly in cybersecurity, not just to mitigate financial loss, but to maintain stakeholder trust.
Website security plays a crucial role in establishing online trust and protecting users’ data. SSL/TLS certificates encrypt data communications between browsers and websites, ensuring that it can’t be…
Discover how AI and ML are revolutionising digital identity security, enhancing threat detection and user authentication. Learn more and protect your digital identities now!
In terms of potential business revenue, find the real value in raising cybersecurity investments through solution upgrades and new technology deployments.
AI & ML redefine digital identity security in 2024! Explore how these innovations fight fraud & protect you. Read our analysis & uncover the future of cybersecurity.
Not all SSL/TLS certificates are created equal! Many businesses have opted for free SSL/TLS certificates over paid versions. There is an obvious advantage in choosing a free SSL/TLS certificate over a…
People think that Blockchain and PKI are rivals, but each are better used in different things. In what situations would PKI be the right technology to adopt?
Explore the evolving cybersecurity landscape in 2024, uncovering challenges and strategic opportunities amid digital identity threats. Stay ahead, fortify defenses, and navigate the tide of…
This comprehensive guide covers five strategies that enable MSPs to leverage identity management solutions and capitalise on the burgeoning digital identity market, enhancing both their service…
Here are some factors to consider when choosing a provider for your Qualified Electronic Signatures (QES).
The Zero Trust security model, centered on the principle "never trust, always verify," challenges traditional security assumptions by treating all users and devices as potential threats, necessitating…
Revisit strategic security goals. Consider how PKI helps with encryption, authentication, access control, CLM, compliance, and regulations.
In this article, we take a look at the different types of electronic signatures used for eIDAS and their appropriate use cases for each type.
In this blog we will explore Post-Quantum-Safe certificates, what they will look like and compare the difference with the certificates we use today.
Explore the vital need for a 2024 digital identity strategy in our latest blog. Discover insights on the evolving digital landscape, covering hybrid work, IoT, quantum computing, and e-commerce.