
- January 07, 2025
- Jaya Mehmie
Code Signing Certificate Validity Changes: What This Means For You
The maximum validity period for Code Signing Certificates is decreasing, but what does this mean for you? Discover more in our blog.
The maximum validity period for Code Signing Certificates is decreasing, but what does this mean for you? Discover more in our blog.
In the fast-paced world of enterprise security the right partner for your digital security needs is non-negotiable. Here’s why you should choose GlobalSign.
Businesses heavily rely on digital certificates, but being crypto-agile is essential to prevent disruptions and respond to threats.
Artificial Intelligence (AI) has become a transformative force across various industries, revolutionizing the way we live and work. From improving…
From 1 September 2023, the new CA/B Forum Baseline Requirements come into effect, are you ready? Read on to learn more
PKI For Businesses: With the progressive evolution of the internet, ensuring the security of businesses' online presence has become an increasingly…
Artificial Intelligence (AI) has become a transformative force across various industries, revolutionizing the way we live and work. From improving healthcare to optimizing transportation, AI's capabilities are awe-inspiring. However, amid the advancements, it is crucial to recognize and comprehend the potential dangers that accompany this powerful technology. This blog sheds light on the importance of understanding AI risks and explores six potential dangers of artificial intelligence.
From 1 September 2023, the new CA/B Forum Baseline Requirements come into effect, are you ready? Read on to learn more
PKI For Businesses: With the progressive evolution of the internet, ensuring the security of businesses' online presence has become an increasingly formidable task, owing to the relentless advancements in cyber threats. While the battle against cyber threats remains ongoing, the risk can be significantly mitigated by incorporating Public Key Infrastructure (PKI) into your business strategy. Now before we dive deeper, let us try to understand the meaning of a Public Key Infrastructure (PKI)?
Protect your website and customers' data with a paid SSL certificate from a trusted CA. Enhance security, boost trust, and improve SEO with strong SSL encryption.
Premium SSL/TLS certificates are cryptographic certificates that protect users' data when they visit your website. They offer numerous value-added benefits like warranty coverage, stronger encryption, trust indicators, and multiple levels of validation that free SSL certificates lack.
Certificate lifecycle management can be daunting, especially if you rely on traditional manual methods, but with certificate automation, you can eliminate inefficiencies and maximise your ROI. Certificate automation refers to the process of streamlining certificate issuance, renewal, revocation, and more.
Quantum computers are advancing quickly. Posing a great risk in the future as they will allow attackers to overcome today’s strongest encryption methods. Read how companies can prepare against this…
Healthcare security breaches accounted for a loss of $6 trillion globally by the end of 2020. Read the top 10 cybersecurity challenges.
As society becomes increasingly reliant on digital processes, conventional business mechanisms have become more automated, with several industry sectors eager to tap into an increasingly tech-savvy…
Email is the primary tool for business communications worldwide for organizations of all sizes. It is also the number one threat vector for cyberattacks. Email threats have evolved from mass spam and…
PKI is one of the most reliable security authentication tools. But how do we streamline and integrate it into the development without disrupting the production process?
Email encryption should be a cornerstone of your business' security plan. Check out this blog to know how your organization can protect itself against e-mail frauds.
Workflow Automation never held enough importance ever before. With organizations facing issues, automation has become a need of an hour. Here are some of the top reasons why you need to automate your…
Utilizing the cloud with other systems and platforms launches the challenge of cloud integration. Read how these challenges can be met to ensure that the benefits outweigh the costs of integration.
First time purchasing an SSL/TLS Certificate? Learn about certificate signing requests or (CSR), what they are, and how to create a CSR in your server.
Getting a common name mismatch / invalid error when visiting your site? We explain how this error can crop up and ways you can fix it.
MFA, or multi-factor authentication, has the power to prevent the majority of data breaches. Yet many organizations are still lagging in implementation.
Start the new year on the right foot with these cybersecurity resolutions
Let’s take a closer look at code signing and SSL certificates so that you can determine which is best for your needs.
Instead, the IoT is affecting the future of work, changing the necessary functions of many jobs. This includes the accounting industry.
Code signing is a popular cryptographic method used by software developers to prove that a piece of software or the code used to create it, is authentic and without any malware. In this blog, we have…
Introducing Atlas, the world’s most powerful cloud CA – a high throughput, fully ubiquitous, next-generation PKI platform that will carry your PKI on its shoulders and into the future.
Another working (from home) week is coming to an end, but sadly, cyber attacks on the healthcare sector are not abating. The most recent victim is Fresenius, Europe’s largest private hospital…
In this guest post from GlobalSign Certified Regional Partner Impression, learn about some of the new technologies that will help relieve the burden on the fragile healthcare system.
For a wide range of businesses around the world, the Coronavirus pandemic has been the push they need to move into the next phase of their digital transformation. If you haven’t yet made the switch to…
From a major US pharmaceutical firm suffering from a ransomware attack (and a data breach) to a hospital in Colorado, the week was marked by an uptick in ransomware oriented stories.
Quantum computing still feels very abstract because we haven’t even begun to truly explore all of the new applications for it. Yet with COVID-19, we have a perfect example of how quantum computing…
GlobalSign’s AWS IoT Integration Guide helps developers quickly integrate GlobalSign’s flexible IoT Identity Platform so they can bring their product to market faster.
A new targeted malicious attack on an annual whiskey auction and more stories are covered in the April 20th edition of the cybersecurity news round-up. Read on for this week's top headlines.
Due to the COVID-19 pandemic, the NFL is planning its first-ever remote draft. From a cybersecurity standpoint, one has to ask, is this going to be a launch point for the worst security hack ever?
Protecting the environment should be a worldwide priority by now. Every organization should do their part, and one way to do so is by going paperless with GlobalSign’s Digital Signing Service.
Earlier this month I had the pleasure of chatting with Jennifer Harris, Senior Business Analyst and Operations Manager at Realyst, a leading contract management software provider in South Africa. Keep…
Bluetooth devices are at the center of the smart technology evolution, but we must be cognizant of the imminent cybersecurity threat that Bluetooth poses and learn to protect ourselves.
The pandemic unfortunately continues to be a field day for hackers. But this week, we are also featuring a few stories about cybersecurity superheroes. Read on for all of this week's stories.
We all use email everyday. But do we understand the importance of ensuring our emails are secure and why? Here are five reasons why email security must be a priority for your business.
When it comes to a digital notarization, some might get confused when thinking about how it’s possible to provide strong security. This is where digital signatures and their companion, trusted time…
Learn the pros and cons of getting a multi-domain SSL/TLS certificate for your website in this blog.
What is an identity thief, and how do you spot one? Learn about identity theft and the preventive measures you and your company can take to avoid becoming a victim.
It's critical to understand potential SSL/TLS certificate errors and how to fix them. Get quick, practical tips in our latest infographic.
Learn what Public Key Infrastructure (PKI) is and how your business can benefit from simplifying certificate management in this blog.
Learn the advantages and disadvantages of an Cloud PKI in this blog.
Learn about the changes in the maximum certificate validity through this infographic.
Learn the advantages and disadvantages of an on-premise PKI infrastructure in this blog.
In this post, we’d like to inform you of some of the upcoming changes that have been mandated by the Root programs and/or the CAB Forum.
Learn how your organization can benefit from Atlas, a high-speed cloud certificate management engine.
Passwords are no longer enough to protect users from data breaches and identity thefts. Learn more about authentication, and how your business can benefit from the different types of solutions.
Are we aware of the risks when using the internet? Learn how you can defend yourself, loved ones, and your company in this blog.
Learn how digitally signing and encrypting your emails with S/MIME Certificates can benefit your business.
Here’s a quick infographic on what SSL/TLS Certificates are, what they can do for your website, and how to choose the most suitable one.
Learn what authentication is, the different types of authentication, and why it is almost a necessity in any network.
In light of recent code signing compromises, the CA/B Forum has mandated that all Code Signing keys be lengthened to improve their security.