
- January 07, 2025
- Jaya Mehmie
Code Signing Certificate Validity Changes: What This Means For You
The maximum validity period for Code Signing Certificates is decreasing, but what does this mean for you? Discover more in our blog.
The maximum validity period for Code Signing Certificates is decreasing, but what does this mean for you? Discover more in our blog.
In the fast-paced world of enterprise security the right partner for your digital security needs is non-negotiable. Here’s why you should choose GlobalSign.
Businesses heavily rely on digital certificates, but being crypto-agile is essential to prevent disruptions and respond to threats.
Artificial Intelligence (AI) has become a transformative force across various industries, revolutionizing the way we live and work. From improving…
From 1 September 2023, the new CA/B Forum Baseline Requirements come into effect, are you ready? Read on to learn more
PKI For Businesses: With the progressive evolution of the internet, ensuring the security of businesses' online presence has become an increasingly…
Artificial Intelligence (AI) has become a transformative force across various industries, revolutionizing the way we live and work. From improving healthcare to optimizing transportation, AI's capabilities are awe-inspiring. However, amid the advancements, it is crucial to recognize and comprehend the potential dangers that accompany this powerful technology. This blog sheds light on the importance of understanding AI risks and explores six potential dangers of artificial intelligence.
From 1 September 2023, the new CA/B Forum Baseline Requirements come into effect, are you ready? Read on to learn more
PKI For Businesses: With the progressive evolution of the internet, ensuring the security of businesses' online presence has become an increasingly formidable task, owing to the relentless advancements in cyber threats. While the battle against cyber threats remains ongoing, the risk can be significantly mitigated by incorporating Public Key Infrastructure (PKI) into your business strategy. Now before we dive deeper, let us try to understand the meaning of a Public Key Infrastructure (PKI)?
Protect your website and customers' data with a paid SSL certificate from a trusted CA. Enhance security, boost trust, and improve SEO with strong SSL encryption.
Premium SSL/TLS certificates are cryptographic certificates that protect users' data when they visit your website. They offer numerous value-added benefits like warranty coverage, stronger encryption, trust indicators, and multiple levels of validation that free SSL certificates lack.
Certificate lifecycle management can be daunting, especially if you rely on traditional manual methods, but with certificate automation, you can eliminate inefficiencies and maximise your ROI. Certificate automation refers to the process of streamlining certificate issuance, renewal, revocation, and more.
It has been over 3 years since the pandemic accelerated technological developments and sparked new uses for pre-existing IoT technology. We take a look at how this has continued to evolve in the…
The Internet of Things (IoT) technology has made our lives more efficient in every aspect, but with this comes risk. In this article, we take a look at the security protocols to help secure IoT…
In this blog, we look at what security measures enterprises can to take to protect websites from cyber attacks.
The key to certificate management is tools and integrations. Learn more about GlobalSign’s PKI as a Service (PKIaaS) Connector for ServiceNow.
March saw a number of healthcare cyberattacks, plus a ransom attack on Ferrari, a new cybersecurity strategy from the White House and more.
In this blog, we take a look at 3 common challenges that face IoT security.
In this blog, we explore how HashiCorp Vault can help enhance security in your DevOps pipelines.
Secure online transactions are ensured by the rule of e-commerce security. But why is it important, and what are the common threats? We explore in this blog.
Industrial IoT has become very attractive targets to cyber criminals, but how can you mitigate IIoT security challenges with PKI solutions? Discover how in this blog.
This article explores the definition and benefits of multi-layered security, along with how you can implement this approach.
Industrial IoT (IIoT) is evolving and defining Industry 4.0, but what are the benefits of reinforcing devices with strong security? We explore this and more.
We explore the five pillars which make up the National Cybersecurity Strategy from the White House, with the vision to a secure digitally-enabled future.
A brief introduction to the Cybersecurity Improvement Act, best practices and IoT adoption in the US Government.
Let’s take a look at the common cyber-attacks which take place in the Internet of Things (IoT).
In this article, we’ll look at what a Qualified Electronic Signature (QES) is and when and why you should sign with one.
Steve Bolton, Strategic Account Manager at GlobalSign shares 5 reasons why it might be time to switch to a new Certificate Authority.
Visitors to sites protected by SSL expect (and deserve) security and protection. When a site doesn’t fully protect or secure all content, a browser will display a “mixed-content” warning. Read this…
Granting access to the B2B portal based on password, or federated identity from the customer domain is typically enough. Access can only reveal information such as pricing, discount percentage,…
The benefits of adopting digital signatures in place of paper-based, wet-ink signatures are obvious - reduce paper waste, decrease operating costs, speed up document delivery, to name a few - but…
With the growing connectedness of all things great and small, the need for trusted identities will take center stage in 2015
GlobalSign is working hard to help its customers and partners with the migration to SHA-2, so we've created a 3 step strategy with tips and considerations to hopefully help make the transition easier.
There are a number of benefits to using a management service for your SSL Certificates, but today we're focusing specifically on how they can help prevent certificate expiration.
After introducing HTTPS by default on all its services, as well as promoting the HTTPS Everywhere initiative, Google is encouraging stronger security once again by reviewing their algorithms to reward…
Learn how an insurance firm wanted to switch from paper-based workflow to an electronic workflow to reduce the turnaround time for policy application and delivery!
Digital Signatures are a tried and true alternative to wet ink signatures. Let’s take a closer look at some of the reasons you should consider using them in place of wet ink signatures.
With cybercrime all around, businesses should invest correctly in cybersecurity, not just to mitigate financial loss, but to maintain stakeholder trust.
Website security plays a crucial role in establishing online trust and protecting users’ data. SSL/TLS certificates encrypt data communications between browsers and websites, ensuring that it can’t be…
Discover how AI and ML are revolutionising digital identity security, enhancing threat detection and user authentication. Learn more and protect your digital identities now!
In terms of potential business revenue, find the real value in raising cybersecurity investments through solution upgrades and new technology deployments.
AI & ML redefine digital identity security in 2024! Explore how these innovations fight fraud & protect you. Read our analysis & uncover the future of cybersecurity.
Not all SSL/TLS certificates are created equal! Many businesses have opted for free SSL/TLS certificates over paid versions. There is an obvious advantage in choosing a free SSL/TLS certificate over a…
People think that Blockchain and PKI are rivals, but each are better used in different things. In what situations would PKI be the right technology to adopt?
Explore the evolving cybersecurity landscape in 2024, uncovering challenges and strategic opportunities amid digital identity threats. Stay ahead, fortify defenses, and navigate the tide of…
This comprehensive guide covers five strategies that enable MSPs to leverage identity management solutions and capitalise on the burgeoning digital identity market, enhancing both their service…
Here are some factors to consider when choosing a provider for your Qualified Electronic Signatures (QES).
The Zero Trust security model, centered on the principle "never trust, always verify," challenges traditional security assumptions by treating all users and devices as potential threats, necessitating…
Revisit strategic security goals. Consider how PKI helps with encryption, authentication, access control, CLM, compliance, and regulations.
In this article, we take a look at the different types of electronic signatures used for eIDAS and their appropriate use cases for each type.
In this blog we will explore Post-Quantum-Safe certificates, what they will look like and compare the difference with the certificates we use today.
Explore the vital need for a 2024 digital identity strategy in our latest blog. Discover insights on the evolving digital landscape, covering hybrid work, IoT, quantum computing, and e-commerce.