
- January 07, 2025
- Jaya Mehmie
Code Signing Certificate Validity Changes: What This Means For You
The maximum validity period for Code Signing Certificates is decreasing, but what does this mean for you? Discover more in our blog.
The maximum validity period for Code Signing Certificates is decreasing, but what does this mean for you? Discover more in our blog.
In the fast-paced world of enterprise security the right partner for your digital security needs is non-negotiable. Here’s why you should choose GlobalSign.
Businesses heavily rely on digital certificates, but being crypto-agile is essential to prevent disruptions and respond to threats.
Artificial Intelligence (AI) has become a transformative force across various industries, revolutionizing the way we live and work. From improving…
From 1 September 2023, the new CA/B Forum Baseline Requirements come into effect, are you ready? Read on to learn more
PKI For Businesses: With the progressive evolution of the internet, ensuring the security of businesses' online presence has become an increasingly…
Artificial Intelligence (AI) has become a transformative force across various industries, revolutionizing the way we live and work. From improving healthcare to optimizing transportation, AI's capabilities are awe-inspiring. However, amid the advancements, it is crucial to recognize and comprehend the potential dangers that accompany this powerful technology. This blog sheds light on the importance of understanding AI risks and explores six potential dangers of artificial intelligence.
From 1 September 2023, the new CA/B Forum Baseline Requirements come into effect, are you ready? Read on to learn more
PKI For Businesses: With the progressive evolution of the internet, ensuring the security of businesses' online presence has become an increasingly formidable task, owing to the relentless advancements in cyber threats. While the battle against cyber threats remains ongoing, the risk can be significantly mitigated by incorporating Public Key Infrastructure (PKI) into your business strategy. Now before we dive deeper, let us try to understand the meaning of a Public Key Infrastructure (PKI)?
Protect your website and customers' data with a paid SSL certificate from a trusted CA. Enhance security, boost trust, and improve SEO with strong SSL encryption.
Streamline cert management! Our comprehensive guide simplifies the switch to automated certificates, saving you time and boosting security.
Electronic Signatures and Digital Signatures sound synonymous but we share the true meaning of each term as well as how they should be used.
Let’s explore Secure by Design as we craft digital environments resistant to threats.
This month we reveal the scary side of cybersecurity with record-breaking DDoS attacks, nationwide data leaks and more in our Halloween NewsScam.
Discover the features and benefits of G-Cloud 13 and how it can revolutionize the way government businesses operate.
Let’s dive into the most interesting AI statistics and trends about artificial intelligence and discover what to expect next.
The ramifications of the MOVEit hack were felt globally. Find out how your business can defend against similar attacks with encryption and automation.
As cyber criminals continue to embrace AI, we look at how digital ID platforms are helping businesses defend against it.
Let’s take a look at the implications of Post-Quantum Computing and why your certificates remain reliable safeguards of your digital assets.
For IT teams, integrating solutions that simplify and streamline efficiency can be a health and safety measure.
This blog clarifies the difference between DevOps and DevSecOps, and explores the elements and challenges of DevSecOps implementation.
In this blog, we will explore the importance of managing your digital certificates and how automation is the key to streamlining your PKI operations.
In this article, we'll take you on a journey through the exciting realm of AI, exploring its advantages and the challenges it presents.
Read all about the latest developments in cybersecurity news in our September edition of NewsScam.
As enterprises continue to adopt IoT exponentially, they must strategically plan to address the cyber risks and challenges associated with IoT devices.
This article provides the best practices for assessing potential vendors to minimize risk exposure.
GlobalSign’s bug bounty program is now public, with Atlas added to the scope. Learn more about the program in this blog.
The ramifications of individual cybersecurity breaches can be devastating. According to a recent article in Threatpost, the average...
In this article we will explain how the Bitcoin Blockchain represents a new class of systems and protocols that are able to store value, pursue a brief inquiry into value...
Human error is one of the top three causes of data breaches, could the gamification of the cyber security training process help businesses to defeat this enemy?
At GlobalSign, everything we do is focused on one thing – protecting identities. So when tax season rolls around next week (April 15), we’re acutely aware how fraud can turn into a nightmare during…
We like to laugh at scams. Once exposed, security risks that fooled thousands turn into stories of “Who could have fallen for that?”
These ransomware attacks may have funny names, but the consequences are no laughing matter.
While no easy task, there are a few steps that app development companies can take up front to make the process easier.
Smart Cities, made possible by the rapid advancement of connected devices, software systems and information communications technologies are helping in the urbanization...
At the show, GlobalSign’s Technology Partner Manager, Mike Boyle, and Sebastian Schultz, Sales Engineer will take a look into PKI and the need for Crypto Agility...
Strong, unique identities are the core of IoT device security. Giving unique identities allows them to be authenticated when they come online and throughout the lifetime. It proves integrity and…
Well, it’s that time of year again. The time when cybersecurity’s best and brightest come together in San Francisco to share our latest thoughts, ideas and wares on combating and managing the scourge…
We’ve all heard of consumer IoT device breaches leading to unnerving situations and events. But when breaches happen to industrially connected IoT devices and systems, the consequences are…
Predictions aren't easy, especially in the chaotic world of cybersecurity. The threat landscape is ever-growing, all thanks to offensive and defensive technologies and nation-state attacks emerging at…
Cryptojacking is the malicious use of a victim’s computer to mine cryptocurrency, and is a growing problem for both individual users and companies. If you’ve never heard of it before, that’s likely…
Sadly, Valentine’s Day has become another opportunity for hackers, cyber thieves, and assorted unsavory folks to wreak havoc. Whether you’re cyber shopping or looking for love online this Valentine’s…
Learn what is a PKCS#12 or .pfx file and guidelines on installing a PKCS#12 on different operating systems.
Regional Product Manager for GlobalSign, Kimberly Johnson looks at Client Authentication through GlobalSign's Auto-Enrolment Gateway.
Since launching our OneClickSSL technology, we have remained focused on further increasing the availability of the solution in hosting environments. We want the technology to be as easy to integrate…