
- January 07, 2025
- Jaya Mehmie
Code Signing Certificate Validity Changes: What This Means For You
The maximum validity period for Code Signing Certificates is decreasing, but what does this mean for you? Discover more in our blog.
The maximum validity period for Code Signing Certificates is decreasing, but what does this mean for you? Discover more in our blog.
In the fast-paced world of enterprise security the right partner for your digital security needs is non-negotiable. Here’s why you should choose GlobalSign.
Businesses heavily rely on digital certificates, but being crypto-agile is essential to prevent disruptions and respond to threats.
Artificial Intelligence (AI) has become a transformative force across various industries, revolutionizing the way we live and work. From improving…
From 1 September 2023, the new CA/B Forum Baseline Requirements come into effect, are you ready? Read on to learn more
PKI For Businesses: With the progressive evolution of the internet, ensuring the security of businesses' online presence has become an increasingly…
Artificial Intelligence (AI) has become a transformative force across various industries, revolutionizing the way we live and work. From improving healthcare to optimizing transportation, AI's capabilities are awe-inspiring. However, amid the advancements, it is crucial to recognize and comprehend the potential dangers that accompany this powerful technology. This blog sheds light on the importance of understanding AI risks and explores six potential dangers of artificial intelligence.
From 1 September 2023, the new CA/B Forum Baseline Requirements come into effect, are you ready? Read on to learn more
PKI For Businesses: With the progressive evolution of the internet, ensuring the security of businesses' online presence has become an increasingly formidable task, owing to the relentless advancements in cyber threats. While the battle against cyber threats remains ongoing, the risk can be significantly mitigated by incorporating Public Key Infrastructure (PKI) into your business strategy. Now before we dive deeper, let us try to understand the meaning of a Public Key Infrastructure (PKI)?
Protect your website and customers' data with a paid SSL certificate from a trusted CA. Enhance security, boost trust, and improve SEO with strong SSL encryption.
Premium SSL/TLS certificates are cryptographic certificates that protect users' data when they visit your website. They offer numerous value-added benefits like warranty coverage, stronger encryption, trust indicators, and multiple levels of validation that free SSL certificates lack.
Certificate lifecycle management can be daunting, especially if you rely on traditional manual methods, but with certificate automation, you can eliminate inefficiencies and maximise your ROI. Certificate automation refers to the process of streamlining certificate issuance, renewal, revocation, and more.
What is Multi-factor Authentication and how can it help control which endpoints can access your networks and resources? Answer this and more
Online dating has become another platform for scammers around the world to try to get money out of vulnerable people. But are the techniques in play and what are companies doing to protect their…
Every day we hear about a new ransomware attack. Here are GlobalSign and Net at Works 7 factors on how to increase email security with automated encryption.
Both the cost and frequency of cyberattacks are increasing, but the National Initiative for Cybersecurity Education (NICE) framework can help to navigate threats - here's how
Ransomware is currently the top type cybersecurity attack on organizations, but what is it and how can you prevent them from occurring within your business?
Phishing continues to be a threat to enterprises and just the starting point for cyberattack, here are 11 tips to spotting malicious emails.
What are the four most common types of email phishing attacks that could occur to your business and how might you protect your business against them?
Ransomware is the most common type of cyberattacks on businesses. But what exactly is it and how do you prevent your business from being attacked?
Preventing data breaches is key to ensuring your business is protected. With the average cost of a breach increasing, here are 10 key best practices for stopping data breaches before they happen.
Phishing is a type of cyberattack which is often deployed by email. But what are the different types of phishing and how can it be prevented?
We are proud to announce GlobalSign have won the Frost & Sullivan Best Practice 2022 Global Competitive Strategy Leadership Award for our TLS solutions. Read more about our win and download the…
The California Privacy Rights Act (CPRA) will soon repeal and replace the existing California Consumer Privacy Act (CCPA). Here are some of the top CPRA compliance tools that can make the journey…
Banks are increasingly moving to the digital space to serve the customers better, a need to be proactive in combating cybersecurity threats is paramount. Read five threats, including practical ways…
In this article, we'll share fifteen web hosting security best practices that you can implement to help keep your site safe and secure.
Processing paper documents may require significant physical space, time, resources, and cost. However, you can integrate cost-effective solutions for your document management and get greater control…
Why should your business switch to Always on SSL? Co-Founder of Pickaweb shares some reasons a business might make the move in this blog post.
Guest blogger David Gaudio shares some tips for SME's who are looking to find the perfect managed service providers.
How do you protect data in the financial industry? We suggest some tips on how strong authentication and public key infrastructure can solve this challenge.
A guide on how to create a strong password. If the thought of someone stealing your password or the passwords of your employees doesn’t scare you, you need to read this
What is multi-factor authentication or MFA? Our IAM Marketing Manager, Petteri Ilhalainen is back to explain this concept and what is meant by 'factors' in authentication.
We share an infographic on the history of the Industrial Internet of Things Cyber Attacks and tips on how to secure the IIoT and strengthen your business.
Our VP of Product Marketing for the IoT, Lancen LaChance, looks at the recent Auto-ISAC guidelines and shares his thoughts on why executive buy-in is important.
We've received countless phishing emails here at GlobalSign, and we've gotten pretty good at spotting them. Here we'll show you what to look out for to avoid being a victim of a phishing attack.
Learn how to download and install a digital certificate, .pfx or PKCS#12 file onto your Android device with our easy to follow, step-by-step guide.
Should service providers and hosting companies really be tempted by free SSL? Before rushing to a free SSL/TLS certificate service make sure you have considered the following.
Between Oct 2013 & May 2016, 22,143 cases of Business Email Compromise, where cyber criminals requested over $3b in fraudulent transfers, were reported. What can we do?
Since the Hillary Clinton email hack, email security has been thrust into the spotlight. But should you be encrypting your emails or your email servers?
Our Identity and Access Management expert, Petteri Ilhalainen, takes a step back and asks: what is the difference between Identity Management and Access Management?
Govind Yadav, Senior Sales Engineer demystifies email security and shares a demo showing how easy it is to create a fake email address.
Following on from our post about reasons to switch your Certificate Authority (CA), VP of Product Management, Doug Beattie is back to explain how to do this in more detail.
There's a solution to email threats and vulnerabilities that allows you to verify and encrypt your emails. Want to find out?
All online merchants will encounter challenges, and only those who solve problems creatively survive - the eCommerce world is cutthroat. In this article, we’ll be running through the top worst-case…
Complicated jargon and language barriers in the field of IT often mean only IT professionals can comprehend data privacy messages. Read more on cybersecurity and translation.
Electronic and digital signing are dominating today’s business processes. But can they be forged? Learn more in this blog!
Corporations Amendment (Meetings and Documents) Bill 2021 became law on February 23. Discover how digital and electronic signatures are affected.
Explore seven solutions for cyber security threats in digital banking.
Want to secure your digital documents? Learn how to easily and digitally sign PDFs with our step-by-step guide. Discover the benefits of using digital signatures, how to create them, and why they…
Discover the latest trends and how the Internet of Things is transforming industries in the Philippines.
Here’s an infographic to help guide you in making a decision when buying a code signing certificate.
Digitization, Digitalization, and Digital Transformation are critical for modern businesses. Know their similarities, differences, and how they benefit businesses in this blog.
Does certificate-based authentication work the same way as other types of authentications? Find out in this infographic!
How is Singapore adopting IoT devices? And what measures can organizations take to keep these devices and machines secure? Know the answers in this blog.
Developing apps or software for Mac OS? Make sure you digitally sign them first with GlobalSign’s Code Signing Certificate! Know why in this infographic.
Fintechs utilize AI to advance services. Learn how AI is used for maximizing investments and to spot real-time fraudulent transactions.
What is an SSL Port or Secured Port and what role does it play in internet security? Know the answers in this blog.