
- January 07, 2025
- Jaya Mehmie
Code Signing Certificate Validity Changes: What This Means For You
The maximum validity period for Code Signing Certificates is decreasing, but what does this mean for you? Discover more in our blog.
The maximum validity period for Code Signing Certificates is decreasing, but what does this mean for you? Discover more in our blog.
In the fast-paced world of enterprise security the right partner for your digital security needs is non-negotiable. Here’s why you should choose GlobalSign.
Businesses heavily rely on digital certificates, but being crypto-agile is essential to prevent disruptions and respond to threats.
Artificial Intelligence (AI) has become a transformative force across various industries, revolutionizing the way we live and work. From improving…
From 1 September 2023, the new CA/B Forum Baseline Requirements come into effect, are you ready? Read on to learn more
PKI For Businesses: With the progressive evolution of the internet, ensuring the security of businesses' online presence has become an increasingly…
Artificial Intelligence (AI) has become a transformative force across various industries, revolutionizing the way we live and work. From improving healthcare to optimizing transportation, AI's capabilities are awe-inspiring. However, amid the advancements, it is crucial to recognize and comprehend the potential dangers that accompany this powerful technology. This blog sheds light on the importance of understanding AI risks and explores six potential dangers of artificial intelligence.
The Basic Requirements (BR) describe the minimum allowed settings and configurations for S/MIME. Read this blog for more information.
PKI For Businesses: With the progressive evolution of the internet, ensuring the security of businesses' online presence has become an increasingly formidable task, owing to the relentless advancements in cyber threats. While the battle against cyber threats remains ongoing, the risk can be significantly mitigated by incorporating Public Key Infrastructure (PKI) into your business strategy. Now before we dive deeper, let us try to understand the meaning of a Public Key Infrastructure (PKI)?
Protect your website and customers' data with a paid SSL certificate from a trusted CA. Enhance security, boost trust, and improve SEO with strong SSL encryption.
Streamline cert management! Our comprehensive guide simplifies the switch to automated certificates, saving you time and boosting security.
Electronic Signatures and Digital Signatures sound synonymous but we share the true meaning of each term as well as how they should be used.
NIST recently announced the first 3 Post-Quantum cryptographic standards, with more to come. Join us as we break them down.
NIST unveils the first set of PQC standards and the UN makes a treaty against cybercrime on the backdrop of a UK home office breach in this month’s NewsScam
Learn how to better manage your IoT devices across a fleet of identities using IoT gateways, and how you can keep them secure using PKI solutions.
Learn what makes digital signatures so useful for securing and streamlining enterprises, and why you need them for your business.
Kubernetes continues to be a staple of production pipelines in organizations, and security is a pressing concern. Learn how to use PKI to secure your pod-to-pod communications.
The CA/Browser Forum dictates of the way digital security is managed through its governance of digital certificates, but who are they and how do they work?
The chain of trust is the cornerstone of online communication and transaction, but how does it work, and why is it so important?
As we celebrate World Wide Web Day, we discuss the key components of establishing digital trust, and its importance in online security.
Join us for your monthly round-up as we discuss the already infamous CrowdStrike outage, the AT&T data breach and much more.
Descubre cómo gestionar certificados digitales en entornos híbridos y multicloud con las mejores prácticas y estrategias eficaces.
Security risk management is no longer optional for businesses in today’s digital world. Learn about the role of risk management and how to implement it.
Revocation checks are used to provide checks and balances and assure trust in the digital space. Join us as we discuss CRL, OCSP and OCSP-stapled checking.
Discover updates to GlobalSign’s ACME service for issuing intranet SSL certificates, what it means and why they are important.
Learn how to automate your DevOps pipelines while keeping security at the forefront of your development using GlobalSign’s PKI solutions.
X.509 certificates are a key component of cybersecurity infrastructure. Read more to discover what they are, their role and importance.
A better internet is upon us in 2020 as Google, Apple, Microsoft, and Mozilla announced yesterday that they end the outdated Transport Layer Security (TLS) 1.0 and 1.1 support in their respective web…
In the internet-powered society we currently live in, the dangers of cyber threats are starting to get more and more dangerous than before. Since almost everything can be found online, hackers…
We all love getting something for free and public Wi-Fi is no different. But is public Wi-Fi secure? Anas Baig is here to tell you why it isn't but don't fret - he also has some tips on how you can…
The Information Security Officers Group (ISOG), an organization of information security officers from leading the country’s leading financial organizations, will host the biggest cybersecurity event…
Facebook shocked its users on Friday after disclosing a recent security breach that affected over 50 million users by extracting passwords form security tokens. As a countermeasure, Facebook logged…
Two weeks ago, Google did what they said they would and flagged HTTP websites as “Not Secure” with the release of Chrome 68. A lot of websites already wised up and upgraded their websites to the safer…
Countries from the APAC Region have been making great efforts to improve their cybersecurity. From forging meaningful partnerships to improving disaster tactics, these recent developments will make…
It’s no secret that hackers will stop at nothing to steal as much credentials as possible. They develop new schemes almost every day designed for injecting malware, keylogger scripts, and other types…
Every time you browse the internet, your digital footprint is collected and stored by third-parties like websites, internet providers, advertisers, etc. Read on to learn what data is kept, how it’s…
Over the course of a year, Google has announced some drastic changes in an effort to cultivate a culture of safety and security online. Google’s efforts revolved around flagging HTTP websites in an…
The Electronic Submissions Gateway (ESG) streamlines electronic regulatory submissions to the FDA, including adverse event reports and new drug applications.
The future of AI looks bright for SMBs. With more processes being taken over by Artificial Intelligence, Small and Medium Businesses will have more opportunity to compete in their industries.
What we can learn from the string of data breaches of past years is that cyberattacks affect everyone, from individuals to large organizations alike. Despite this, only 56% of companies in the entire…
Big data allows businesses to spot patterns in a way that improves organisational efficiency. In particular, big data is used by big tech companies (most famously Facebook, Apple, Amazon, Microsoft…
Making computer software and applications involves hours and hours of hard work. It takes so much effort to make a completely functional application that developers tend to forget how they should…