
- January 07, 2025
- Jaya Mehmie
Code Signing Certificate Validity Changes: What This Means For You
The maximum validity period for Code Signing Certificates is decreasing, but what does this mean for you? Discover more in our blog.
The maximum validity period for Code Signing Certificates is decreasing, but what does this mean for you? Discover more in our blog.
In the fast-paced world of enterprise security the right partner for your digital security needs is non-negotiable. Here’s why you should choose GlobalSign.
Businesses heavily rely on digital certificates, but being crypto-agile is essential to prevent disruptions and respond to threats.
Artificial Intelligence (AI) has become a transformative force across various industries, revolutionizing the way we live and work. From improving…
From 1 September 2023, the new CA/B Forum Baseline Requirements come into effect, are you ready? Read on to learn more
PKI For Businesses: With the progressive evolution of the internet, ensuring the security of businesses' online presence has become an increasingly…
Artificial Intelligence (AI) has become a transformative force across various industries, revolutionizing the way we live and work. From improving healthcare to optimizing transportation, AI's capabilities are awe-inspiring. However, amid the advancements, it is crucial to recognize and comprehend the potential dangers that accompany this powerful technology. This blog sheds light on the importance of understanding AI risks and explores six potential dangers of artificial intelligence.
From 1 September 2023, the new CA/B Forum Baseline Requirements come into effect, are you ready? Read on to learn more
PKI For Businesses: With the progressive evolution of the internet, ensuring the security of businesses' online presence has become an increasingly formidable task, owing to the relentless advancements in cyber threats. While the battle against cyber threats remains ongoing, the risk can be significantly mitigated by incorporating Public Key Infrastructure (PKI) into your business strategy. Now before we dive deeper, let us try to understand the meaning of a Public Key Infrastructure (PKI)?
Protect your website and customers' data with a paid SSL certificate from a trusted CA. Enhance security, boost trust, and improve SEO with strong SSL encryption.
Streamline cert management! Our comprehensive guide simplifies the switch to automated certificates, saving you time and boosting security.
Electronic Signatures and Digital Signatures sound synonymous but we share the true meaning of each term as well as how they should be used.
Discover the latest innovations in our digital certificate management ecosystem through the enhanced PKIaaS Connector for ServiceNow!
Here are 3 areas to consider when securing document signing workflows in the financial services.
February has been a busy month in cybersecurity, including new developments on LockBit, spy-cranes and much more in this month’s NewsScam.
Manual certificate management to secure identities is no longer sustainable, but cert-manager is an automated tool for securing Kubernetes clusters.
Here are some factors to consider when choosing a provider for your Qualified Electronic Signatures (QES).
In this blog, we review why automation and encryption are important in improving time efficiency and mitigating risks in digital certificate management workflows.
Let’s look at energy labels and how they have adapted to accurately reflect the changing landscape of energy-efficient products.
In this blog, we look at the critical importance of securing digital identities, the cost of data breaches, and what to consider when evaluating digital identity solutions.
There’s More than Water Leaking at Two Major Water Companies, LockBit Snacks on Subway, plus researchers discover the ‘Mother of all Breaches’ and more in the latest edition of NewsScam
Organizations improve productivity and efficiency with AI, but what about the risks? This blog explores the concerns surrounding AI misinformation.
In this article, we look at the European Union and global countries different requirements regarding the mandatory elements in an invoice.
In this article, we take a look at the different types of electronic signatures used for eIDAS and their appropriate use cases for each type.
Let’s explore the DevOps security skills gap and how a security coaching program can assist in addressing the issue.
In this blog we will explore Post-Quantum-Safe certificates, what they will look like and compare the difference with the certificates we use today.
Let’s look at how to improve SSL/TLS certificate management through automation and how Atlas Discovery solution can help.
Cryptographic key storage is hugely important in keeping your Digital Certificates safe from attack. With so many options, we wanted to give you the ultimate guide for your specific use case.
What are the Digital Signature requirements for Architecture, Engineering and Construction? If you're holding off on making the move to Digital Signatures until the government mandate, you might…
What is cyber-stalking and what can you do to protect yourself against it? With cyber-stalking on the rise, Guest Blogger and Cybersecurity Journalist, Anas Baig has some tips to prevent you being the…
Bring your own device is a win-win for employees and employers alike. However, like most things, BYOD policies come with their own challenges and risks. Learn what these are and how to avoid them.
Health Care Industry Cybersecurity (HCIC) Task Force released a report on improving cybersecurity in the healthcare industry. Here's why Digital Certificates can help to ensure you follow these…
In today's world, an organization is only as valuable as the data they hold. As the number of cyber-attacks rise on small and large enterprises alike, we look at 5 ways to enhance your data security.
Guest contributor and cybersecurity journalist Anas Baig shares his top 10 Virtual Private Networks (VPNs) for browsing the internet with privacy and security in mind.
Digital Signatures in the cloud is a unique Digital Signing Service coming soon to GlobalSign. Find out how your business can benefit from easier, more flexible and more scalable ways to keep…
In the light of recent attack WannaCry and increase in attacks on small businesses, cybersecurity expert Peter Buttler shares tips on how to protect your start-up from ransomware.
WannaCry Ransomware is sweeping the world. After severely affecting the operations of the NHS, WannaCry spread to over 200,000 computers across the world. How can we stay protected?
As the FCC look to kill net neutrality, Anas Baig offers his opinion on the proposed regulations and what this means for U.S. citizens personal data privacy.
Want to browse the internet safely without being tracked? Here’s how you can keep your digital footprints safe and secure in this era of mass surveillance.
Getting a common name mismatch / invalid error when visiting your site? We explain how this error can crop up and ways you can fix it.
How to spot a fake website from a real one. With phishing websites on the rise 400% in 2016 and rising more today, companies and users need to know what to look out for to stay safe online.
We've been taught to look for https and the padlock before trusting a website, but is a secure website actually a safe website?
With cybercrime all around, businesses should invest correctly in cybersecurity, not just to mitigate financial loss, but to maintain stakeholder trust.
Website security plays a crucial role in establishing online trust and protecting users’ data. SSL/TLS certificates encrypt data communications between browsers and websites, ensuring that it can’t be…
Discover how AI and ML are revolutionising digital identity security, enhancing threat detection and user authentication. Learn more and protect your digital identities now!
In terms of potential business revenue, find the real value in raising cybersecurity investments through solution upgrades and new technology deployments.
AI & ML redefine digital identity security in 2024! Explore how these innovations fight fraud & protect you. Read our analysis & uncover the future of cybersecurity.
Not all SSL/TLS certificates are created equal! Many businesses have opted for free SSL/TLS certificates over paid versions. There is an obvious advantage in choosing a free SSL/TLS certificate over a…
People think that Blockchain and PKI are rivals, but each are better used in different things. In what situations would PKI be the right technology to adopt?
Explore the evolving cybersecurity landscape in 2024, uncovering challenges and strategic opportunities amid digital identity threats. Stay ahead, fortify defenses, and navigate the tide of…
This comprehensive guide covers five strategies that enable MSPs to leverage identity management solutions and capitalise on the burgeoning digital identity market, enhancing both their service…
Here are some factors to consider when choosing a provider for your Qualified Electronic Signatures (QES).
The Zero Trust security model, centered on the principle "never trust, always verify," challenges traditional security assumptions by treating all users and devices as potential threats, necessitating…
Revisit strategic security goals. Consider how PKI helps with encryption, authentication, access control, CLM, compliance, and regulations.
In this article, we take a look at the different types of electronic signatures used for eIDAS and their appropriate use cases for each type.
In this blog we will explore Post-Quantum-Safe certificates, what they will look like and compare the difference with the certificates we use today.
Explore the vital need for a 2024 digital identity strategy in our latest blog. Discover insights on the evolving digital landscape, covering hybrid work, IoT, quantum computing, and e-commerce.