
- January 07, 2025
- Jaya Mehmie
Code Signing Certificate Validity Changes: What This Means For You
The maximum validity period for Code Signing Certificates is decreasing, but what does this mean for you? Discover more in our blog.
The maximum validity period for Code Signing Certificates is decreasing, but what does this mean for you? Discover more in our blog.
In the fast-paced world of enterprise security the right partner for your digital security needs is non-negotiable. Here’s why you should choose GlobalSign.
Businesses heavily rely on digital certificates, but being crypto-agile is essential to prevent disruptions and respond to threats.
Artificial Intelligence (AI) has become a transformative force across various industries, revolutionizing the way we live and work. From improving…
From 1 September 2023, the new CA/B Forum Baseline Requirements come into effect, are you ready? Read on to learn more
PKI For Businesses: With the progressive evolution of the internet, ensuring the security of businesses' online presence has become an increasingly…
Artificial Intelligence (AI) has become a transformative force across various industries, revolutionizing the way we live and work. From improving healthcare to optimizing transportation, AI's capabilities are awe-inspiring. However, amid the advancements, it is crucial to recognize and comprehend the potential dangers that accompany this powerful technology. This blog sheds light on the importance of understanding AI risks and explores six potential dangers of artificial intelligence.
From 1 September 2023, the new CA/B Forum Baseline Requirements come into effect, are you ready? Read on to learn more
PKI For Businesses: With the progressive evolution of the internet, ensuring the security of businesses' online presence has become an increasingly formidable task, owing to the relentless advancements in cyber threats. While the battle against cyber threats remains ongoing, the risk can be significantly mitigated by incorporating Public Key Infrastructure (PKI) into your business strategy. Now before we dive deeper, let us try to understand the meaning of a Public Key Infrastructure (PKI)?
Protect your website and customers' data with a paid SSL certificate from a trusted CA. Enhance security, boost trust, and improve SEO with strong SSL encryption.
Premium SSL/TLS certificates are cryptographic certificates that protect users' data when they visit your website. They offer numerous value-added benefits like warranty coverage, stronger encryption, trust indicators, and multiple levels of validation that free SSL certificates lack.
Certificate lifecycle management can be daunting, especially if you rely on traditional manual methods, but with certificate automation, you can eliminate inefficiencies and maximise your ROI. Certificate automation refers to the process of streamlining certificate issuance, renewal, revocation, and more.
Processing paper documents may require significant physical space, time, resources, and cost. However, you can integrate cost-effective solutions for your document management and get greater control…
The proliferation of malware and nefarious websites makes users cautious of downloading software or applications digitally. If they cannot determine who the publisher is or whether or not the software…
Every business aims to become more efficient and agile, especially as the pace of digital transformation is accelerating. Streamlining business processes and workflows is an efficient and durable way…
Robotic Process Automation (RPA) is a business strategy to automate technology that utilizes software robots to automate tasks conducted by the human workforce. Robotic process automation (RPA), also…
A Distributed Denial of Service (DDoS) attack is a non-intrusive internet attack designed to harm the targeted website. It is a malicious attempt to disrupt the regular traffic of a targeted server,…
In recent years, cyberattacks have become more refined, increasing the demand for a comprehensive cybersecurity strategy and tooling. From any government agency to the startups, every organization…
Internet of Things (IoT) devices are becoming ubiquitous while IoT services are becoming pervasive. Their success has not gone unnoticed, and the number of threats and attacks against IoT devices and…
Security plays a significant role in every entrepreneur or company with a website in the online world. The escalating increase of online attacks is a dangerous threat to the thriving of every…
While there are many different steps that can be taken to secure a wireless network, these 12 best practices are essential for ensuring that your data and devices are safe from malicious actors.
There are many steps companies can take to secure their Kubernetes workloads. One best practice that Kubernetes itself recommends is the extensive use of transport layer security (TLS).
A Code Signing Certificate is a digital certificate that contains information that fully identifies an entity and is issued by a Certificate Authority. It allows developers to include information…
Website security can be a complex topic in an ever-evolving internet landscape. While the importance of website security is undisputed, protecting against online threats is continuously growing more…
Quantum computers are advancing quickly. Posing a great risk in the future as they will allow attackers to overcome today’s strongest encryption methods. Read how companies can prepare against this…
Healthcare security breaches accounted for a loss of $6 trillion globally by the end of 2020. Read the top 10 cybersecurity challenges.
As society becomes increasingly reliant on digital processes, conventional business mechanisms have become more automated, with several industry sectors eager to tap into an increasingly tech-savvy…
It never fails…Every day, workers use the same laptop in the office used at home. Others bring their phones and connect to company Wi-Fi. While it may seem innocuous, this habit can cause profound…
In this blog post, we discuss 3 unique ways app development companies can improve cybersecurity practices.
In past eras, cybersecurity wasn’t an issue for business owners. But now, the internet defines many corporate activities...
2018 was a pivotal year for GlobalSign – and the security industry in general. From new partnerships and integrations to expanded capabilities in Europe and significant developments in IoT – the most…
The world is evolving at the speed of light and the emergences of new technological trends are shaping a new future that businesses must be quick to adapt to.
In a world where new attacks happen every day – action must be taken now - regardless of the state of a larger US cybersecurity strategy. No more waiting. Now’s the time.
The rise of the dark web has changed many things for criminals. Long a haven for the buying and selling of drugs, weapons, fake ID, and confidential data, new research has also shown that advanced…
Mike James will take a look at how well British Airways handled their data breach, including whether they acted in accordance with the rules of the GPDR, and what the potential outcome could be.
Some of GlobalSign's favorite employees are asked to gaze into their crystal balls and glean some insight into next year's cybersecurity landscape. What do you expect to see next year?
Let's take a closer look at the reference architecture of APIs for Open Banking and how financial institutions and FinTechs can safely share data under this architecture.
Conducting KYC, or Know Your Customer, checks are essential, not only when you onboard new clients, but also during regular intervals to ensure their situation hasn’t changed.
In just a few months, the world of SSL/TLS can change so much. From updates on PCI compliance to Chrome changing the UI and distrusting Symantec roots, down to Cloudflare encrypting SNI. Catch up in…
Also known as DNS spoofing, DNS cache poisoning is an attack designed to locate and then exploit vulnerabilities that exist in a domain name system (DNS), drawing traffic away from a legitimate server…
We all love getting something for free and public Wi-Fi is no different. But is public Wi-Fi secure? Anas Baig is here to tell you why it isn't but don't fret - he also has some tips on how you can…
The last time you went through an airport, you probably encountered the internet of things without even knowing it. Read on to find out how IoT technology is helping streamline the airline industry.
With cybercrime all around, businesses should invest correctly in cybersecurity, not just to mitigate financial loss, but to maintain stakeholder trust.
Website security plays a crucial role in establishing online trust and protecting users’ data. SSL/TLS certificates encrypt data communications between browsers and websites, ensuring that it can’t be…
Discover how AI and ML are revolutionising digital identity security, enhancing threat detection and user authentication. Learn more and protect your digital identities now!
In terms of potential business revenue, find the real value in raising cybersecurity investments through solution upgrades and new technology deployments.
AI & ML redefine digital identity security in 2024! Explore how these innovations fight fraud & protect you. Read our analysis & uncover the future of cybersecurity.
Not all SSL/TLS certificates are created equal! Many businesses have opted for free SSL/TLS certificates over paid versions. There is an obvious advantage in choosing a free SSL/TLS certificate over a…
People think that Blockchain and PKI are rivals, but each are better used in different things. In what situations would PKI be the right technology to adopt?
Explore the evolving cybersecurity landscape in 2024, uncovering challenges and strategic opportunities amid digital identity threats. Stay ahead, fortify defenses, and navigate the tide of…
This comprehensive guide covers five strategies that enable MSPs to leverage identity management solutions and capitalise on the burgeoning digital identity market, enhancing both their service…
Here are some factors to consider when choosing a provider for your Qualified Electronic Signatures (QES).
The Zero Trust security model, centered on the principle "never trust, always verify," challenges traditional security assumptions by treating all users and devices as potential threats, necessitating…
Revisit strategic security goals. Consider how PKI helps with encryption, authentication, access control, CLM, compliance, and regulations.
In this article, we take a look at the different types of electronic signatures used for eIDAS and their appropriate use cases for each type.
In this blog we will explore Post-Quantum-Safe certificates, what they will look like and compare the difference with the certificates we use today.
Explore the vital need for a 2024 digital identity strategy in our latest blog. Discover insights on the evolving digital landscape, covering hybrid work, IoT, quantum computing, and e-commerce.