
- January 07, 2025
- Jaya Mehmie
Code Signing Certificate Validity Changes: What This Means For You
The maximum validity period for Code Signing Certificates is decreasing, but what does this mean for you? Discover more in our blog.
The maximum validity period for Code Signing Certificates is decreasing, but what does this mean for you? Discover more in our blog.
In the fast-paced world of enterprise security the right partner for your digital security needs is non-negotiable. Here’s why you should choose GlobalSign.
Businesses heavily rely on digital certificates, but being crypto-agile is essential to prevent disruptions and respond to threats.
Artificial Intelligence (AI) has become a transformative force across various industries, revolutionizing the way we live and work. From improving…
From 1 September 2023, the new CA/B Forum Baseline Requirements come into effect, are you ready? Read on to learn more
PKI For Businesses: With the progressive evolution of the internet, ensuring the security of businesses' online presence has become an increasingly…
Artificial Intelligence (AI) has become a transformative force across various industries, revolutionizing the way we live and work. From improving healthcare to optimizing transportation, AI's capabilities are awe-inspiring. However, amid the advancements, it is crucial to recognize and comprehend the potential dangers that accompany this powerful technology. This blog sheds light on the importance of understanding AI risks and explores six potential dangers of artificial intelligence.
The Basic Requirements (BR) describe the minimum allowed settings and configurations for S/MIME. Read this blog for more information.
PKI For Businesses: With the progressive evolution of the internet, ensuring the security of businesses' online presence has become an increasingly formidable task, owing to the relentless advancements in cyber threats. While the battle against cyber threats remains ongoing, the risk can be significantly mitigated by incorporating Public Key Infrastructure (PKI) into your business strategy. Now before we dive deeper, let us try to understand the meaning of a Public Key Infrastructure (PKI)?
Protect your website and customers' data with a paid SSL certificate from a trusted CA. Enhance security, boost trust, and improve SEO with strong SSL encryption.
Streamline cert management! Our comprehensive guide simplifies the switch to automated certificates, saving you time and boosting security.
Electronic Signatures and Digital Signatures sound synonymous but we share the true meaning of each term as well as how they should be used.
Each month in 2021, we’ll be introducing you to a member of the GlobalSign team. Follow along and meet the people working hard to bring you industry-leading PKI and identity solutions.
In this series, we're breaking down the top 5 cybersecurity challenges for several high-growth industries. First up: How digital transformation is raising the alarm in financial services.
A massive data breach at Facebook, reports of a "significant" attack at the European Commission, and the Golden Chicken ransomware gang is doing more than winging it.
As the saying goes, an ounce of prevention is worth a pound of cure. In this article, we'll discuss why two-factor authentication has such a high success rate in protecting healthcare organizations.
If you don’t have the right online security measures in place, you risk your business falling victim to an attack like whaling, which usually results in financial loss or stolen information.
As a retailer, how do you reassure online shoppers that they can trust your eCommerce store? This question is extremely crucial at any time of the year, and particularly during this holiday season.
If we've learned anything from the last year, it's that no business is immune to cyber attacks. But there are steps you can take to minimize the risk and protect your people, data, and information.
Find out who needs eIDAS-compliant digital certificates for electronic signing, what problems they solve, and how they are implemented.
In this article, we’ll discuss why mobile application security is so crucial today, along with potential threats that should be considered in app development.
This week, we’ve announced that DSS is becoming more powerful than ever. Utilizing our new Atlas platform allows organizations to benefit from high volume long-lived, trusted digital signing at any…
In this blog, we explain why organizations shouldn't take a manual approach to certificate lifecycle management with containers and Kubernetes.
This week a well-known cybersecurity training company was hit by a data breach due to a phishing attack, making it clear that even the best of organizations can be no match for bad actors.
In today’s blog, we’ll cover the European Telecommunications Standards Institute’s (ETSI) new cybersecurity standard for Internet of Things devices, ETSI EN 303 645.
In this week's cybersecurity news, observers are dissecting what happened at Garmin, which many sites are reporting paid hackers a fee in the millions. Apparently the criminals used a ransomware…
The healthcare industry is traditionally an industry well known for paper trails, but change is coming. Check out these 4 reasons why it pays to digitally sign healthcare documents.
Learn how to run your own simulated phishing test and reduce the risk of social engineering attacks on your organization. We show you examples of how GlobalSign do it.
What is S/MIME or secure email certificates and how do they help protect your organization? If you are new to email encryption and signing, this is the perfect place to start.
We answer the questions: what is timestamping, what is trusted timestamping and how timestamping works? We also look at common transactions where timestamping would be used.
Guest blogger, Denver Prophit Jr, gives a quick start guide to HSTS. What is HSTS and HSTS preloading, how do you use it and how to implement it on various servers.
GlobalSign will be attending RSA Conference at the Moscone Center in San Francisco. We have a lot of exciting developments to show you, check out the schedule here.
CASC's new Code Signing Certificate requirements are setting a standard for code signing. Are you ready? Learn what these minimal requirements will mean for developers.
A Distributed Denial of Service Attack (DDoS) is, unfortunately, an increasingly common form of premeditated attack against an organization’s web infrastructure. Typically, it involves using…
Internal server names and reserved IPs are not allowed in public SSL/TLS Certificates. Learn why and your solution options.
IoT Product Manager at GlobalSign, Nisarg Desai explains what an IoT Gateway is, how to secure it and how it can transform your current IoT ecosystem.
Our VP of Marketing recently attended the Internet Retailer Conference and noticed that security is still not being addressed by eCommerce platform providers.
Our VP of Product Management, Doug Beattie takes a closer look at the new CASC infographic: 'What Kind of SSl/TLS Certificate Do I Need?'
The Internet of Things is still young and as such it is still vulnerable to hacking. Lea Tom's shares the top 5 threats and tips on how to combat them.
As Information Technology and Operational Technology for the Industrial Internet become more aligned, our Product Manager, Nisarg Desai explores their place in the IloT.
Passwords just aren't reliable enough anymore. Certificate-based authentication is an efficient way to solve the problem of passwords in an organization.
Govind Yadav, Senior Sales Engineer demystifies email security and shares a demo showing how easy it is to create a fake email address.