
- January 07, 2025
- Jaya Mehmie
Code Signing Certificate Validity Changes: What This Means For You
The maximum validity period for Code Signing Certificates is decreasing, but what does this mean for you? Discover more in our blog.
The maximum validity period for Code Signing Certificates is decreasing, but what does this mean for you? Discover more in our blog.
In the fast-paced world of enterprise security the right partner for your digital security needs is non-negotiable. Here’s why you should choose GlobalSign.
Businesses heavily rely on digital certificates, but being crypto-agile is essential to prevent disruptions and respond to threats.
Artificial Intelligence (AI) has become a transformative force across various industries, revolutionizing the way we live and work. From improving…
From 1 September 2023, the new CA/B Forum Baseline Requirements come into effect, are you ready? Read on to learn more
PKI For Businesses: With the progressive evolution of the internet, ensuring the security of businesses' online presence has become an increasingly…
Artificial Intelligence (AI) has become a transformative force across various industries, revolutionizing the way we live and work. From improving healthcare to optimizing transportation, AI's capabilities are awe-inspiring. However, amid the advancements, it is crucial to recognize and comprehend the potential dangers that accompany this powerful technology. This blog sheds light on the importance of understanding AI risks and explores six potential dangers of artificial intelligence.
From 1 September 2023, the new CA/B Forum Baseline Requirements come into effect, are you ready? Read on to learn more
PKI For Businesses: With the progressive evolution of the internet, ensuring the security of businesses' online presence has become an increasingly formidable task, owing to the relentless advancements in cyber threats. While the battle against cyber threats remains ongoing, the risk can be significantly mitigated by incorporating Public Key Infrastructure (PKI) into your business strategy. Now before we dive deeper, let us try to understand the meaning of a Public Key Infrastructure (PKI)?
Protect your website and customers' data with a paid SSL certificate from a trusted CA. Enhance security, boost trust, and improve SEO with strong SSL encryption.
Premium SSL/TLS certificates are cryptographic certificates that protect users' data when they visit your website. They offer numerous value-added benefits like warranty coverage, stronger encryption, trust indicators, and multiple levels of validation that free SSL certificates lack.
Certificate lifecycle management can be daunting, especially if you rely on traditional manual methods, but with certificate automation, you can eliminate inefficiencies and maximise your ROI. Certificate automation refers to the process of streamlining certificate issuance, renewal, revocation, and more.
Containers may provision the DevOps pipeline but how can you safeguard them with SSL/TLS certificates? Read on to find out
As the risks of cyber-attacks increase, learn how you can adopt a robust cybersecurity position to protect your cargo.
In this blog post, we're going to look at how Generative AI affects data security and how we can mitigate any possible risks.
In this blog we’ll recap why eSeals are important and explore why Qualified Trust Seals provide a whole host of benefits for organizations.
This helpful guide breaks down what an electronic seal is, and how to choose one that is right for your organization.
What do statistics, AI, fires, scandal, aliens and sharks all have in common? The August edition of NewsScam, of course!
Changes to the PKI market have created new challenges for IT teams. Here, we explore what they are and how businesses can prepare.
Uncover the secrets of end-to-end encryption, including how to keep your digital conversations secure. Powerful technology safeguards your messages & data.
Curious about the ACME protocol and its advantages? Discover how this protocol works and the benefits it brings to businesses and individuals.
Many businesses are making the switch to GlobalSign as their top PKI provider. Find out why customers have been choosing GlobalSign for over 25 years.
From 1 September 2023, the new CA/B Forum Baseline Requirements come into effect, are you ready? Read on to learn more.
In this article, we will explore the types of biometric tech and how it is expanding the adoption of remote identity verification.
A celebration of World Wide Web Day and why protecting digital identity is important.
Welcome to the July edition of NewsScam, full of the latest stories in the past month including Barbie, MOVEit and more.
Let’s explore the mechanisms of BEC and how to protect your business and the innovative use of artificial intelligence (AI) to enhance security.
Explore how IoT network security begins with secure device enrolment and how industry leaders must prioritize IoT security.
Artificial Intelligence (AI) has become a transformative force across various industries, revolutionizing the way we live and work. From improving healthcare to optimizing transportation, AI's…
From 1 September 2023, the new CA/B Forum Baseline Requirements come into effect, are you ready? Read on to learn more
PKI For Businesses: With the progressive evolution of the internet, ensuring the security of businesses' online presence has become an increasingly formidable task, owing to the relentless…
Do you know what SSL/TLS certificates you have in your organization? Read more to learn about the certificate inventory tool that could help you.
As more and more Enterprises are adopting DevOps culture there has been a significant rise in the usage of Container Services. According to the CNCF Survey 2020 , 92% of respondents say they use…
In this increasingly hyperconnected world, digital transformation helps improve the productivity of the organization. Technological innovation continues to support organizations in carrying out their…
Security is a critical concern for today's enterprises and their customers, especially with many employees pivoting to remote work over the past couple of years. To protect their most valuable and…
Processing paper documents may require significant physical space, time, resources, and cost. However, you can integrate cost-effective solutions for your document management and get greater control…
The proliferation of malware and nefarious websites makes users cautious of downloading software or applications digitally. If they cannot determine who the publisher is or whether or not the software…
Every business aims to become more efficient and agile, especially as the pace of digital transformation is accelerating. Streamlining business processes and workflows is an efficient and durable way…
Robotic Process Automation (RPA) is a business strategy to automate technology that utilizes software robots to automate tasks conducted by the human workforce. Robotic process automation (RPA), also…
A Distributed Denial of Service (DDoS) attack is a non-intrusive internet attack designed to harm the targeted website. It is a malicious attempt to disrupt the regular traffic of a targeted server,…
In recent years, cyberattacks have become more refined, increasing the demand for a comprehensive cybersecurity strategy and tooling. From any government agency to the startups, every organization…
Internet of Things (IoT) devices are becoming ubiquitous while IoT services are becoming pervasive. Their success has not gone unnoticed, and the number of threats and attacks against IoT devices and…
Security in the healthcare industry is crucial as it involves patients’ personal information and private medical details. The industry is built on peoples’ trust, and any breach may result in…
In this week’s security news round-up, you’ll find two specific articles about paying hackers: one company that did and another one that didn’t. See how it panned out for them.
April 9th is world-wide IoT Day. A day to celebrate all that is the Internet of Things. IoT Day, like the Internet of Things itself is relatively new.
Before the world was deeply plunged into the world of Covid-19, the Mexican government was impacted by a cyber attack.
GlobalSign is proud to announce its partnership with DocuSign. Together, we’re helping businesses improve their efficiency, eliminate the need for paper-ridden processes, and ensure they’re meeting…
We've put together a checklist to help marketers take the proper steps to comply with CCPA – protecting their customers and avoiding huge fines.
Another week has gone by as we all work remotely. Cyber attacks persist, even in regions hardest-hit by the Coronavirus. In Italy, attackers took down the country’s social security website.
GlobalSign is inviting all Partner Program members worldwide to submit ideas for future GlobalSign blog posts. Whether you want to submit a guest blog article or simply suggest a topic or idea, we…
Remote work comes with its disadvantages. While most enterprises have been focusing on their digital transformation, many are still utilizing processes that have manual, printed, or face-to-face…
Despite COVID-19’s rapid spread and deepening hold on the world, many hackers are sadly continuing to take advantage of it. Unfortunately, this includes continued attacks on the medical and healthcare…
We’re back with another support post and this time we’re sharing our top support queries or SSL Certificates Errors and how to solve them.
Hackers. They’re a unique bunch. Naturally, they have decided to take advantage of the Coronavirus. Keep reading to see 3 ways hackers are wreaking havoc and trying to make a buck during this crisis.
It is probably not much of a surprise, but the current cybersecurity news theme is all Coronavirus, all the time.
It's a brave new world for many businesses across the globe thanks to the Coronavirus. Here are 7 things you must know before you work from home.
The Coronavirus is changing everything. Amid talk of social distancing, quarantine, and stock market crashes, though, there is one aspect of the impact of the pandemic that has been a little…
Consider adding another layer of security to your network. Here’s a quick guide on everything you need to know about certificate-based authentication.
Know the impact of IoT or smart devices in the healthcare industry, its risks, and more in this blog.
Find out what are the basic ways to spot a secure website in this guide.
Need a document management and signing solution that is compliant to the FDA’s 21 CFR Part 11? In this blog, we’ll discuss how GMO Sign is compliant to the FDA’s 21 CFR Part 11.
Installing an SSL certificate is not as complicated as most think! Here’s a guide to help you walk through the installation process of TLS certificates.
How did the Internet evolve since its inception? What were the developments of PKI throughout the years that changed the way we communicate? All this and more in this blog.
Learn the basics of the Internet of Things (IoT), advantages and disadvantages, how PKI plays an important role in IoT security, and more in this blog.
What is certificate-based authentication and how can it improve your business’ cybersecurity posture? Know the answers and more in this blog.
Learn what important roles hardware security modules (HSM) play in encryption, the pros and cons of using one, and more in this blog.
Learn what is an electronic transaction, what processes can be considered as one, the regulations in the APAC region the govern it, and more in this blog.
Are electronic signing and digital signing the same? Know the difference between digital and electronic signature in this infographic.
Learn all about TLS handshakes and how to fix TLS handshake issues in this blog.
Learn what is SSL, what is SSH, and the key differences between the two.
Learn how to create and use electronic signatures on word, the pros and cons of using e-signatures, and what are the differences between them and digital signatures.
Learn the pros and cons of getting a multi-domain SSL/TLS certificate for your website in this blog.