
- January 07, 2025
- Jaya Mehmie
Code Signing Certificate Validity Changes: What This Means For You
The maximum validity period for Code Signing Certificates is decreasing, but what does this mean for you? Discover more in our blog.
The maximum validity period for Code Signing Certificates is decreasing, but what does this mean for you? Discover more in our blog.
In the fast-paced world of enterprise security the right partner for your digital security needs is non-negotiable. Here’s why you should choose GlobalSign.
Businesses heavily rely on digital certificates, but being crypto-agile is essential to prevent disruptions and respond to threats.
Artificial Intelligence (AI) has become a transformative force across various industries, revolutionizing the way we live and work. From improving…
From 1 September 2023, the new CA/B Forum Baseline Requirements come into effect, are you ready? Read on to learn more
PKI For Businesses: With the progressive evolution of the internet, ensuring the security of businesses' online presence has become an increasingly…
Artificial Intelligence (AI) has become a transformative force across various industries, revolutionizing the way we live and work. From improving healthcare to optimizing transportation, AI's capabilities are awe-inspiring. However, amid the advancements, it is crucial to recognize and comprehend the potential dangers that accompany this powerful technology. This blog sheds light on the importance of understanding AI risks and explores six potential dangers of artificial intelligence.
From 1 September 2023, the new CA/B Forum Baseline Requirements come into effect, are you ready? Read on to learn more
PKI For Businesses: With the progressive evolution of the internet, ensuring the security of businesses' online presence has become an increasingly formidable task, owing to the relentless advancements in cyber threats. While the battle against cyber threats remains ongoing, the risk can be significantly mitigated by incorporating Public Key Infrastructure (PKI) into your business strategy. Now before we dive deeper, let us try to understand the meaning of a Public Key Infrastructure (PKI)?
Protect your website and customers' data with a paid SSL certificate from a trusted CA. Enhance security, boost trust, and improve SEO with strong SSL encryption.
Streamline cert management! Our comprehensive guide simplifies the switch to automated certificates, saving you time and boosting security.
Electronic Signatures and Digital Signatures sound synonymous but we share the true meaning of each term as well as how they should be used.
May saw data leaks and data breaches as a pretty strong theme, with a few big organizations announcing they were victims. Read on to discover more.
In this blog, we will explore why it’s important to secure Docker containers using SSL/TLS certificates, and how to do it.
If you haven’t already automated certificate management, now is the time. We explore why in this blog and how ACME can help to do so.
In this blog we look at how PKI and Zero Trust can work together to strengthen security posture.
Over the last few months Google have made announcements which could see an industry shift in the browser market. Read the blog for more details.
Google is removing the padlocking icon later this year, but does this mean websites won’t be secure?
Document sealing and signing has been through an evolution. Discover how our Qualified Signing Service (QSS) can help your business be more secure.
Explore the technologies that are available to ensure secure and safe email communications such as S/MIME.
Multi-factor authentication (MFA) is one of the most simple-yet-effective ways to bolster security. Don’t believe us, here are five reasons why.
Read all the newest Cybersecurity headlines including phone charging during your travels, and of course, all about scandal around the Pentagon cybersecurity incident caused by a 21-year-old, and so…
Read how IoT is revolutionizing every facet of supply chain management and how logistics companies are capitalizing on IoT benefits.
Replacing paper-based transactions can positively impact a company’s environmental footprint, read our blog to learn more.
It has been over 3 years since the pandemic accelerated technological developments and sparked new uses for pre-existing IoT technology. We take a look at how this has continued to evolve in the…
The Internet of Things (IoT) technology has made our lives more efficient in every aspect, but with this comes risk. In this article, we take a look at the security protocols to help secure IoT…
In this blog, we look at what security measures enterprises can to take to protect websites from cyber attacks.
With over 50% of respondents indicating that they roll-out new technology before having proper levels of security in place, it's no wonder that cybercrime is on the rise. This is just the first domino…
Where to get started when preparing for GDPR? Mike James, Technology Specialist offers six steps to preparing your company for the up coming General Data Protection Regulation or UK Data Protection…
GlobalSign's recent survey in the US and EMEA shows that companies are still slow to adopt basic cybersecurity principles. Is it any wonder that cybercrime is still rife?
Compliance as a service is a new market built by cloud-service providers, ready to help you become compliant with regulations like GDPR. Find out how in this post.
What is Certificate Authority Authorization (CAA) checking? On September 7th 2017, the CA/Browser Forum Guidelines will require all CA's to check CAA records before issuing certificates.
The new Internet of Things Cybersecurity Improvement Act sets about to increase security standards for IoT devices installed in US government networks. A step in the right direction.
Our US General Manager, Lila Kee comments on the recent acquisition of Symantec by DigiCert. What's the road ahead look like for Symantec and DigiCert customers?
What is Certificate Transparency or CT Policy? Here's everything you need to know about Certificate Transparency (CT), including how it works and how you can comply with Google's policy.
Every industry is at the risk of cyber-attacks. Here’s how industries are fighting back and how cybersecurity companies are working to curb the epidemic.
As Digital Signature law continues to adapt and Digital Signatures are recognized as the legal equivalent of handwritten signatures, Nadim Farah looks at how this is causing a paradigm shift in the…
What is the General Data Protection Regulation (GDPR) and what does it mean for your business? If you haven't yet heard the news and you trade in the EU, Mike James of Redscan explains.
Before implementing a SaaS solution, you should be wary of possible cybersecurity risks associated with having your data in the cloud. Here's 5 security related questions you should be asking…
Today's market for cloud-based XaaS service providers is fiercely competitive. Product Managers are looking for new ways to make their product stand out in the market. Here's why we think PKI will do…
If you're using a VPN, your IP address might still be exposed due to a leak. Anas Baig explains what an IP leak is in more detail and shares a quick how to guide to check if you're IP has been…
Symantec customers are soon to be affected by the news that Google will no longer trust their certificates. Now this on top of possible rumors that they could sell their web certificate business? Find…
With cybercrime all around, businesses should invest correctly in cybersecurity, not just to mitigate financial loss, but to maintain stakeholder trust.
Website security plays a crucial role in establishing online trust and protecting users’ data. SSL/TLS certificates encrypt data communications between browsers and websites, ensuring that it can’t be…
Discover how AI and ML are revolutionising digital identity security, enhancing threat detection and user authentication. Learn more and protect your digital identities now!
In terms of potential business revenue, find the real value in raising cybersecurity investments through solution upgrades and new technology deployments.
AI & ML redefine digital identity security in 2024! Explore how these innovations fight fraud & protect you. Read our analysis & uncover the future of cybersecurity.
Not all SSL/TLS certificates are created equal! Many businesses have opted for free SSL/TLS certificates over paid versions. There is an obvious advantage in choosing a free SSL/TLS certificate over a…
People think that Blockchain and PKI are rivals, but each are better used in different things. In what situations would PKI be the right technology to adopt?
Explore the evolving cybersecurity landscape in 2024, uncovering challenges and strategic opportunities amid digital identity threats. Stay ahead, fortify defenses, and navigate the tide of…
This comprehensive guide covers five strategies that enable MSPs to leverage identity management solutions and capitalise on the burgeoning digital identity market, enhancing both their service…
Here are some factors to consider when choosing a provider for your Qualified Electronic Signatures (QES).
The Zero Trust security model, centered on the principle "never trust, always verify," challenges traditional security assumptions by treating all users and devices as potential threats, necessitating…
Revisit strategic security goals. Consider how PKI helps with encryption, authentication, access control, CLM, compliance, and regulations.
In this article, we take a look at the different types of electronic signatures used for eIDAS and their appropriate use cases for each type.
In this blog we will explore Post-Quantum-Safe certificates, what they will look like and compare the difference with the certificates we use today.
Explore the vital need for a 2024 digital identity strategy in our latest blog. Discover insights on the evolving digital landscape, covering hybrid work, IoT, quantum computing, and e-commerce.