
- January 07, 2025
- Jaya Mehmie
Code Signing Certificate Validity Changes: What This Means For You
The maximum validity period for Code Signing Certificates is decreasing, but what does this mean for you? Discover more in our blog.
The maximum validity period for Code Signing Certificates is decreasing, but what does this mean for you? Discover more in our blog.
In the fast-paced world of enterprise security the right partner for your digital security needs is non-negotiable. Here’s why you should choose GlobalSign.
Businesses heavily rely on digital certificates, but being crypto-agile is essential to prevent disruptions and respond to threats.
Artificial Intelligence (AI) has become a transformative force across various industries, revolutionizing the way we live and work. From improving…
From 1 September 2023, the new CA/B Forum Baseline Requirements come into effect, are you ready? Read on to learn more
PKI For Businesses: With the progressive evolution of the internet, ensuring the security of businesses' online presence has become an increasingly…
Artificial Intelligence (AI) has become a transformative force across various industries, revolutionizing the way we live and work. From improving healthcare to optimizing transportation, AI's capabilities are awe-inspiring. However, amid the advancements, it is crucial to recognize and comprehend the potential dangers that accompany this powerful technology. This blog sheds light on the importance of understanding AI risks and explores six potential dangers of artificial intelligence.
From 1 September 2023, the new CA/B Forum Baseline Requirements come into effect, are you ready? Read on to learn more
PKI For Businesses: With the progressive evolution of the internet, ensuring the security of businesses' online presence has become an increasingly formidable task, owing to the relentless advancements in cyber threats. While the battle against cyber threats remains ongoing, the risk can be significantly mitigated by incorporating Public Key Infrastructure (PKI) into your business strategy. Now before we dive deeper, let us try to understand the meaning of a Public Key Infrastructure (PKI)?
Protect your website and customers' data with a paid SSL certificate from a trusted CA. Enhance security, boost trust, and improve SEO with strong SSL encryption.
Premium SSL/TLS certificates are cryptographic certificates that protect users' data when they visit your website. They offer numerous value-added benefits like warranty coverage, stronger encryption, trust indicators, and multiple levels of validation that free SSL certificates lack.
Certificate lifecycle management can be daunting, especially if you rely on traditional manual methods, but with certificate automation, you can eliminate inefficiencies and maximise your ROI. Certificate automation refers to the process of streamlining certificate issuance, renewal, revocation, and more.
It has been over 3 years since the pandemic accelerated technological developments and sparked new uses for pre-existing IoT technology. We take a look at how this has continued to evolve in the…
The Internet of Things (IoT) technology has made our lives more efficient in every aspect, but with this comes risk. In this article, we take a look at the security protocols to help secure IoT…
In this blog, we look at what security measures enterprises can to take to protect websites from cyber attacks.
The key to certificate management is tools and integrations. Learn more about GlobalSign’s PKI as a Service (PKIaaS) Connector for ServiceNow.
March saw a number of healthcare cyberattacks, plus a ransom attack on Ferrari, a new cybersecurity strategy from the White House and more.
In this blog, we take a look at 3 common challenges that face IoT security.
In this blog, we explore how HashiCorp Vault can help enhance security in your DevOps pipelines.
Secure online transactions are ensured by the rule of e-commerce security. But why is it important, and what are the common threats? We explore in this blog.
Industrial IoT has become very attractive targets to cyber criminals, but how can you mitigate IIoT security challenges with PKI solutions? Discover how in this blog.
This article explores the definition and benefits of multi-layered security, along with how you can implement this approach.
Industrial IoT (IIoT) is evolving and defining Industry 4.0, but what are the benefits of reinforcing devices with strong security? We explore this and more.
We explore the five pillars which make up the National Cybersecurity Strategy from the White House, with the vision to a secure digitally-enabled future.
A brief introduction to the Cybersecurity Improvement Act, best practices and IoT adoption in the US Government.
Let’s take a look at the common cyber-attacks which take place in the Internet of Things (IoT).
In this article, we’ll look at what a Qualified Electronic Signature (QES) is and when and why you should sign with one.
As the IoT industry has matured, our customers have expressed a desire for a more streamlined device enrollment process with customizable levels of security, so we put our team to work re-imagining…
The US Senate’s new anti-encryption bill represents a major threat to the internet security ecosystem.
This week has not been marked by major events (not yet anyway, but hey, Friday’s only half over.) What stood out the most this week were stories about Microsoft.
More sectors and industries will look to IoT going forward to entice customers, expand their brands, and enhance customer experiences. In the same way, IoT manufacturers will be required to deliver…
Protecting your banking apps from different security breaches amid the COVID-19 crisis has become the need of the hour. In this age of data breaches, you have to secure your business alongside your…
Our weekly blog discusses stolen files on the Dark Web, new U.S. government encryption battle, one-year certificate mandate, Russians targeting Americans working at home.
As governments around the world continue to face the escalating crisis and come up with pandemic management plans, many are considering the benefits of digital contact tracing.
Starting September 1, 2020, Apple and Google will no longer trust certificates issued for longer than 397 days.
This week's cybersecurity news blog discusses a possible SSL incident at Samsung, Twitter’s big data breach, an ongoing cyberattack in Australia and the 2 year mark of GDPR.
This smart technology has, largely, been useful in the fight against COVID-19. Unfortunately, however, AI is also playing a role in burdening the health industry at a time when it needs all the help…
COVID-19 has really underlined the importance of using digital technology to educate, prevent the spread, warn us, and increase awareness in future pandemics.
Amazon Web Services (AWS) disclosed it was the victim of the largest ever recorded DDoS attack. The event has been described as a “reflection attack,” an attempt to use a vulnerable third-party server…
In this piece, we’ll dive into exactly how America’s electoral integrity is at risk due to cyber attacks, and then talk about the best methods that can be used to improve both access and security in…
There are many things that businesses can learn from the COVID-19 pandemic with regard to cybersecurity.
We asked expert Richard Brooks for his thoughts regarding the current threat landscape and mitigating strategies facing the energy sector.
There's a solution to email threats and vulnerabilities that allows you to verify and encrypt your emails. Want to find out?
All online merchants will encounter challenges, and only those who solve problems creatively survive - the eCommerce world is cutthroat. In this article, we’ll be running through the top worst-case…
Complicated jargon and language barriers in the field of IT often mean only IT professionals can comprehend data privacy messages. Read more on cybersecurity and translation.
Electronic and digital signing are dominating today’s business processes. But can they be forged? Learn more in this blog!
Corporations Amendment (Meetings and Documents) Bill 2021 became law on February 23. Discover how digital and electronic signatures are affected.
Explore seven solutions for cyber security threats in digital banking.
Want to secure your digital documents? Learn how to easily and digitally sign PDFs with our step-by-step guide. Discover the benefits of using digital signatures, how to create them, and why they…
Discover the latest trends and how the Internet of Things is transforming industries in the Philippines.
Here’s an infographic to help guide you in making a decision when buying a code signing certificate.
Digitization, Digitalization, and Digital Transformation are critical for modern businesses. Know their similarities, differences, and how they benefit businesses in this blog.
Does certificate-based authentication work the same way as other types of authentications? Find out in this infographic!
How is Singapore adopting IoT devices? And what measures can organizations take to keep these devices and machines secure? Know the answers in this blog.
Developing apps or software for Mac OS? Make sure you digitally sign them first with GlobalSign’s Code Signing Certificate! Know why in this infographic.
Fintechs utilize AI to advance services. Learn how AI is used for maximizing investments and to spot real-time fraudulent transactions.
What is an SSL Port or Secured Port and what role does it play in internet security? Know the answers in this blog.