
- January 07, 2025
- Jaya Mehmie
Code Signing Certificate Validity Changes: What This Means For You
The maximum validity period for Code Signing Certificates is decreasing, but what does this mean for you? Discover more in our blog.
The maximum validity period for Code Signing Certificates is decreasing, but what does this mean for you? Discover more in our blog.
In the fast-paced world of enterprise security the right partner for your digital security needs is non-negotiable. Here’s why you should choose GlobalSign.
Businesses heavily rely on digital certificates, but being crypto-agile is essential to prevent disruptions and respond to threats.
Artificial Intelligence (AI) has become a transformative force across various industries, revolutionizing the way we live and work. From improving…
From 1 September 2023, the new CA/B Forum Baseline Requirements come into effect, are you ready? Read on to learn more
PKI For Businesses: With the progressive evolution of the internet, ensuring the security of businesses' online presence has become an increasingly…
Artificial Intelligence (AI) has become a transformative force across various industries, revolutionizing the way we live and work. From improving healthcare to optimizing transportation, AI's capabilities are awe-inspiring. However, amid the advancements, it is crucial to recognize and comprehend the potential dangers that accompany this powerful technology. This blog sheds light on the importance of understanding AI risks and explores six potential dangers of artificial intelligence.
From 1 September 2023, the new CA/B Forum Baseline Requirements come into effect, are you ready? Read on to learn more
PKI For Businesses: With the progressive evolution of the internet, ensuring the security of businesses' online presence has become an increasingly formidable task, owing to the relentless advancements in cyber threats. While the battle against cyber threats remains ongoing, the risk can be significantly mitigated by incorporating Public Key Infrastructure (PKI) into your business strategy. Now before we dive deeper, let us try to understand the meaning of a Public Key Infrastructure (PKI)?
Protect your website and customers' data with a paid SSL certificate from a trusted CA. Enhance security, boost trust, and improve SEO with strong SSL encryption.
Streamline cert management! Our comprehensive guide simplifies the switch to automated certificates, saving you time and boosting security.
Electronic Signatures and Digital Signatures sound synonymous but we share the true meaning of each term as well as how they should be used.
May saw data leaks and data breaches as a pretty strong theme, with a few big organizations announcing they were victims. Read on to discover more.
In this blog, we will explore why it’s important to secure Docker containers using SSL/TLS certificates, and how to do it.
If you haven’t already automated certificate management, now is the time. We explore why in this blog and how ACME can help to do so.
In this blog we look at how PKI and Zero Trust can work together to strengthen security posture.
Over the last few months Google have made announcements which could see an industry shift in the browser market. Read the blog for more details.
Google is removing the padlocking icon later this year, but does this mean websites won’t be secure?
Document sealing and signing has been through an evolution. Discover how our Qualified Signing Service (QSS) can help your business be more secure.
Explore the technologies that are available to ensure secure and safe email communications such as S/MIME.
Multi-factor authentication (MFA) is one of the most simple-yet-effective ways to bolster security. Don’t believe us, here are five reasons why.
Read all the newest Cybersecurity headlines including phone charging during your travels, and of course, all about scandal around the Pentagon cybersecurity incident caused by a 21-year-old, and so…
Read how IoT is revolutionizing every facet of supply chain management and how logistics companies are capitalizing on IoT benefits.
Replacing paper-based transactions can positively impact a company’s environmental footprint, read our blog to learn more.
It has been over 3 years since the pandemic accelerated technological developments and sparked new uses for pre-existing IoT technology. We take a look at how this has continued to evolve in the…
The Internet of Things (IoT) technology has made our lives more efficient in every aspect, but with this comes risk. In this article, we take a look at the security protocols to help secure IoT…
In this blog, we look at what security measures enterprises can to take to protect websites from cyber attacks.
One of the common pitfalls a company might fall into is assuming that its cybersecurity solutions are maintained and managed via standard risk assessments.
GlobalSign conducted a survey earlier this year to better understand how, and why, companies are using Public Key Infrastructure (PKI) based certificates. Nearly 750 people participated in the survey,…
As a freelancer, balancing your need for privacy with your desire to get work can be difficult. Often, so many questions arise: Should you share personal information that can be used to identify you…
This has been another busy year for hackers. As for what we can expect in 2020, only time will tell. In the meantime, we’ve asked some of GlobalSign’s brightest minds to share their thoughts.
While getting people to trust online shopping was a huge hurdle for e-commerce 20 years ago, today’s online shoppers often think nothing of filling out forms and providing data.
If you don’t work in IT, chances are low you’ve come across the acronym “PKI.” You’re probably not familiar with the concept or – more likely – you’ve never even heard of it.
The personal records of nearly every single resident of Ecuador, including 6.7 million children - even infants -- were exposed due to a colossal data breach. That works out to
Building an online store should be an enjoyable and exciting experience, but there are serious issues that must be considered to ensure the business – and customers – are kept as safe as possible.…
Scams are an integral part of the online world. There are hundreds of different attack strategies used by cybercriminals. One of the classic scamming techniques is phishing. While an older strategy,…
There was no black out, but it could have been a DDoS attack...
Today there’s a huge wave toward protecting consumer privacy – in Congress, with the GDPR, etc. – but how can we protect user privacy on the web without establishing the identity of the websites that…
There’s no denying the crisis created by a sudden rise in automated phishing attacks. And it’s happening with more convincing content and greater accuracy due to Artificial Intelligence (AI), Machine…
IT is at the heart of operations for a majority of small businesses, so robust security measures are vital. For those just starting out, here are some top tips.
The recent hack against Capital One may be one of the biggest ever in terms of the number of customers affected as well as business impact. The breach on March 22 and 23, 2019 exposed the personal…
How to prevent getting Doxxing? It refers to someone gathering pieces of personal information and posting them online - whether on a private page or in a more public location. Find out more in this…
A better internet is upon us in 2020 as Google, Apple, Microsoft, and Mozilla announced yesterday that they end the outdated Transport Layer Security (TLS) 1.0 and 1.1 support in their respective web…
In the internet-powered society we currently live in, the dangers of cyber threats are starting to get more and more dangerous than before. Since almost everything can be found online, hackers…
We all love getting something for free and public Wi-Fi is no different. But is public Wi-Fi secure? Anas Baig is here to tell you why it isn't but don't fret - he also has some tips on how you can…
The Information Security Officers Group (ISOG), an organization of information security officers from leading the country’s leading financial organizations, will host the biggest cybersecurity event…
Facebook shocked its users on Friday after disclosing a recent security breach that affected over 50 million users by extracting passwords form security tokens. As a countermeasure, Facebook logged…
Two weeks ago, Google did what they said they would and flagged HTTP websites as “Not Secure” with the release of Chrome 68. A lot of websites already wised up and upgraded their websites to the safer…
Countries from the APAC Region have been making great efforts to improve their cybersecurity. From forging meaningful partnerships to improving disaster tactics, these recent developments will make…
It’s no secret that hackers will stop at nothing to steal as much credentials as possible. They develop new schemes almost every day designed for injecting malware, keylogger scripts, and other types…
Every time you browse the internet, your digital footprint is collected and stored by third-parties like websites, internet providers, advertisers, etc. Read on to learn what data is kept, how it’s…
Over the course of a year, Google has announced some drastic changes in an effort to cultivate a culture of safety and security online. Google’s efforts revolved around flagging HTTP websites in an…
The Electronic Submissions Gateway (ESG) streamlines electronic regulatory submissions to the FDA, including adverse event reports and new drug applications.
The future of AI looks bright for SMBs. With more processes being taken over by Artificial Intelligence, Small and Medium Businesses will have more opportunity to compete in their industries.
What we can learn from the string of data breaches of past years is that cyberattacks affect everyone, from individuals to large organizations alike. Despite this, only 56% of companies in the entire…
Big data allows businesses to spot patterns in a way that improves organisational efficiency. In particular, big data is used by big tech companies (most famously Facebook, Apple, Amazon, Microsoft…
Making computer software and applications involves hours and hours of hard work. It takes so much effort to make a completely functional application that developers tend to forget how they should…