
- January 07, 2025
- Jaya Mehmie
Code Signing Certificate Validity Changes: What This Means For You
The maximum validity period for Code Signing Certificates is decreasing, but what does this mean for you? Discover more in our blog.
The maximum validity period for Code Signing Certificates is decreasing, but what does this mean for you? Discover more in our blog.
In the fast-paced world of enterprise security the right partner for your digital security needs is non-negotiable. Here’s why you should choose GlobalSign.
Businesses heavily rely on digital certificates, but being crypto-agile is essential to prevent disruptions and respond to threats.
Artificial Intelligence (AI) has become a transformative force across various industries, revolutionizing the way we live and work. From improving…
From 1 September 2023, the new CA/B Forum Baseline Requirements come into effect, are you ready? Read on to learn more
PKI For Businesses: With the progressive evolution of the internet, ensuring the security of businesses' online presence has become an increasingly…
Artificial Intelligence (AI) has become a transformative force across various industries, revolutionizing the way we live and work. From improving healthcare to optimizing transportation, AI's capabilities are awe-inspiring. However, amid the advancements, it is crucial to recognize and comprehend the potential dangers that accompany this powerful technology. This blog sheds light on the importance of understanding AI risks and explores six potential dangers of artificial intelligence.
From 1 September 2023, the new CA/B Forum Baseline Requirements come into effect, are you ready? Read on to learn more
PKI For Businesses: With the progressive evolution of the internet, ensuring the security of businesses' online presence has become an increasingly formidable task, owing to the relentless advancements in cyber threats. While the battle against cyber threats remains ongoing, the risk can be significantly mitigated by incorporating Public Key Infrastructure (PKI) into your business strategy. Now before we dive deeper, let us try to understand the meaning of a Public Key Infrastructure (PKI)?
Protect your website and customers' data with a paid SSL certificate from a trusted CA. Enhance security, boost trust, and improve SEO with strong SSL encryption.
Premium SSL/TLS certificates are cryptographic certificates that protect users' data when they visit your website. They offer numerous value-added benefits like warranty coverage, stronger encryption, trust indicators, and multiple levels of validation that free SSL certificates lack.
Certificate lifecycle management can be daunting, especially if you rely on traditional manual methods, but with certificate automation, you can eliminate inefficiencies and maximise your ROI. Certificate automation refers to the process of streamlining certificate issuance, renewal, revocation, and more.
Welcome to the July edition of NewsScam, full of the latest stories in the past month including Barbie, MOVEit and more.
Let’s explore the mechanisms of BEC and how to protect your business and the innovative use of artificial intelligence (AI) to enhance security.
PKI For Businesses: With the progressive evolution of the internet, ensuring the security of businesses' online presence has become an increasingly formidable task, owing to the relentless…
Data security can still be an issue with outsourced software development teams. Here’s what to do about it to prevent potential threats.
In this blog we look at the risk of self-signed certificates and why you shouldn’t use them to secure your DevOps pipeline.
This article will look at what biometric authentication is and what it is used for.
Let us delve into the drawbacks organizations should be aware of when considering multi-year plans for PKI certificates.
eIDAS 2.0 is coming! Explore how the regulation has evolved and how it can broaden the scope of digital identity for B2B and consumers.
It’s about time for this month’s NewsScam and let me tell you this: it’s all about MOVEit, MOVEit – and not in terms of anyone liking it though!
ACME can help make DevOps teams lives easier and the pipeline more secure. Discover how in this blog.
In this blog, we investigate the security vulnerabilities of Microsoft Active Directory, and explore how to mitigate these cybersecurity risk factors.
Do you know what SSL/TLS certificates you have in your organization? Read more to learn about the certificate inventory tool that could help you.
Smart home IoT is rapidly increasing, and so too is the need for tighter security measures of these devices. Read on to discover more.
In this blog, we’ll explore how SAN Licencing can help enhance security and provide flexibility for SSL/TLS certificates.
May saw data leaks and data breaches as a pretty strong theme, with a few big organizations announcing they were victims. Read on to discover more.
We thought it was about time we toot our own horn. Here's a list of everything we are most proud to say makes us who we are. If you're considering us as a vendor, we hope this list speaks to your…
If there's one resolution on your list this year, make it penetration testing. Mike James is back to show you how penetration testing is an investment you will not regret - it even helps to comply…
GlobalSign has been up to a lot in 2017 and we wanted to give you a breakdown of our most significant milestones, including our most exciting product updates and releases you may have missed!
What does 2018 have in store for the cybersecurity community? Estonian-based cybersecurity analyst John Mason has a look at some of the key trends and challenges that will be taking the world by storm…
Ponemon released a report called 'Costs of a Data Breach in the US in 2017'. We take a look at this report as the year ends and reflect on what companies need to do in 2018 to avoid average costs of…
What is paperless banking? We'll show you how banks and financial institutions can make the most of technology to improve efficiency, productivity and decrease costs associated with paper, ink and…
Google has published a report analyzing the use of phishing kits in stealing Google email credentials. This analysis highlighted that tools used by phishing attackers have remained unchanged since…
IoT has the potential to transform the supply chain industry, particularly freight forwarding. Here's a few examples of logistics companies using IoT from supply chain and tech enthusiast Syed Abdul…
2017 has been a big year for the CA industry. The CA/B Forum have made many changes to the regulations surrounding digital certificates, market leaders have crashed and acquisitions have been made.
When's the last time cybersecurity awareness training really made you change your behaviour? Is training enough to stop employees clicking phishing links? Dane Boyd from PhishLabs thinks there is…
Whether you're an aspiring CISO or you're about to hire one, this blog is for you. We asked the professionals to tell us what they think makes a great CISO and discovered these top 7 qualities to…
How do you choose the right SSL Certificate provider? Whether you're looking for a single certificate or a custom CA, these tips will help you determine which Certificate Authority is right for you.
Negligent employees are still the #1 cause of data breaches which is why companies are adopting multi-factor authentication, or MFA, to supplement the password.
Are you looking for a list of popular cryptographic algorithms? Find the most well known symmetric and asymmetric algorithms and whether or not they can still be used today.
Sainsbury's Bank UK have released a friendly infographic message to having a safe and fraud free holiday shopping season. Here's some thoughts from us on how to avoid being a victim of the grinch-like…
There's a solution to email threats and vulnerabilities that allows you to verify and encrypt your emails. Want to find out?
All online merchants will encounter challenges, and only those who solve problems creatively survive - the eCommerce world is cutthroat. In this article, we’ll be running through the top worst-case…
Complicated jargon and language barriers in the field of IT often mean only IT professionals can comprehend data privacy messages. Read more on cybersecurity and translation.
Electronic and digital signing are dominating today’s business processes. But can they be forged? Learn more in this blog!
Corporations Amendment (Meetings and Documents) Bill 2021 became law on February 23. Discover how digital and electronic signatures are affected.
Explore seven solutions for cyber security threats in digital banking.
Want to secure your digital documents? Learn how to easily and digitally sign PDFs with our step-by-step guide. Discover the benefits of using digital signatures, how to create them, and why they…
Discover the latest trends and how the Internet of Things is transforming industries in the Philippines.
Here’s an infographic to help guide you in making a decision when buying a code signing certificate.
Digitization, Digitalization, and Digital Transformation are critical for modern businesses. Know their similarities, differences, and how they benefit businesses in this blog.
Does certificate-based authentication work the same way as other types of authentications? Find out in this infographic!
How is Singapore adopting IoT devices? And what measures can organizations take to keep these devices and machines secure? Know the answers in this blog.
Developing apps or software for Mac OS? Make sure you digitally sign them first with GlobalSign’s Code Signing Certificate! Know why in this infographic.
Fintechs utilize AI to advance services. Learn how AI is used for maximizing investments and to spot real-time fraudulent transactions.
What is an SSL Port or Secured Port and what role does it play in internet security? Know the answers in this blog.