
- January 07, 2025
- Jaya Mehmie
Code Signing Certificate Validity Changes: What This Means For You
The maximum validity period for Code Signing Certificates is decreasing, but what does this mean for you? Discover more in our blog.
The maximum validity period for Code Signing Certificates is decreasing, but what does this mean for you? Discover more in our blog.
In the fast-paced world of enterprise security the right partner for your digital security needs is non-negotiable. Here’s why you should choose GlobalSign.
Businesses heavily rely on digital certificates, but being crypto-agile is essential to prevent disruptions and respond to threats.
Artificial Intelligence (AI) has become a transformative force across various industries, revolutionizing the way we live and work. From improving…
From 1 September 2023, the new CA/B Forum Baseline Requirements come into effect, are you ready? Read on to learn more
PKI For Businesses: With the progressive evolution of the internet, ensuring the security of businesses' online presence has become an increasingly…
Artificial Intelligence (AI) has become a transformative force across various industries, revolutionizing the way we live and work. From improving healthcare to optimizing transportation, AI's capabilities are awe-inspiring. However, amid the advancements, it is crucial to recognize and comprehend the potential dangers that accompany this powerful technology. This blog sheds light on the importance of understanding AI risks and explores six potential dangers of artificial intelligence.
From 1 September 2023, the new CA/B Forum Baseline Requirements come into effect, are you ready? Read on to learn more
PKI For Businesses: With the progressive evolution of the internet, ensuring the security of businesses' online presence has become an increasingly formidable task, owing to the relentless advancements in cyber threats. While the battle against cyber threats remains ongoing, the risk can be significantly mitigated by incorporating Public Key Infrastructure (PKI) into your business strategy. Now before we dive deeper, let us try to understand the meaning of a Public Key Infrastructure (PKI)?
Protect your website and customers' data with a paid SSL certificate from a trusted CA. Enhance security, boost trust, and improve SEO with strong SSL encryption.
Premium SSL/TLS certificates are cryptographic certificates that protect users' data when they visit your website. They offer numerous value-added benefits like warranty coverage, stronger encryption, trust indicators, and multiple levels of validation that free SSL certificates lack.
Certificate lifecycle management can be daunting, especially if you rely on traditional manual methods, but with certificate automation, you can eliminate inefficiencies and maximise your ROI. Certificate automation refers to the process of streamlining certificate issuance, renewal, revocation, and more.
In this blog, we explore how HashiCorp Vault can help enhance security in your DevOps pipelines.
Secure online transactions are ensured by the rule of e-commerce security. But why is it important, and what are the common threats? We explore in this blog.
Industrial IoT has become very attractive targets to cyber criminals, but how can you mitigate IIoT security challenges with PKI solutions? Discover how in this blog.
This article explores the definition and benefits of multi-layered security, along with how you can implement this approach.
Industrial IoT (IIoT) is evolving and defining Industry 4.0, but what are the benefits of reinforcing devices with strong security? We explore this and more.
We explore the five pillars which make up the National Cybersecurity Strategy from the White House, with the vision to a secure digitally-enabled future.
A brief introduction to the Cybersecurity Improvement Act, best practices and IoT adoption in the US Government.
Let’s take a look at the common cyber-attacks which take place in the Internet of Things (IoT).
In this article, we’ll look at what a Qualified Electronic Signature (QES) is and when and why you should sign with one.
The monthly round up of cybersecurity news, including DDoS, impacts of previous attacks, takedowns, close shaves and focus on the education sector and NATO.
The Internet of Things (IoT) is becoming increasingly essential in terms of assisting with product development and enhancements. It can also deliver significant benefits within the manufacturing…
The number of vulnerabilities to IoT devices is increasing. This article explores how protecting IoT devices can be more secure and make the internet safer.
The Internet of Things (IoT) is the network of internet-connected objects. In this article, we look at the history and the future of IoT.
Digital identity is a hot topic right now, with the recent changes to Twitters blue tick verification. Enter the discussion on what the future of digital identity will look like!
A top mobile provider is breached, international postal operations come to a halt, passwords become compromised, ship management software impacted, plus Meta and Apple have received data privacy…
Explore how IoT network security begins with secure device enrolment and how industry leaders must prioritize IoT security.
Artificial Intelligence (AI) has become a transformative force across various industries, revolutionizing the way we live and work. From improving healthcare to optimizing transportation, AI's…
From 1 September 2023, the new CA/B Forum Baseline Requirements come into effect, are you ready? Read on to learn more
PKI For Businesses: With the progressive evolution of the internet, ensuring the security of businesses' online presence has become an increasingly formidable task, owing to the relentless…
Do you know what SSL/TLS certificates you have in your organization? Read more to learn about the certificate inventory tool that could help you.
As more and more Enterprises are adopting DevOps culture there has been a significant rise in the usage of Container Services. According to the CNCF Survey 2020 , 92% of respondents say they use…
In this increasingly hyperconnected world, digital transformation helps improve the productivity of the organization. Technological innovation continues to support organizations in carrying out their…
Security is a critical concern for today's enterprises and their customers, especially with many employees pivoting to remote work over the past couple of years. To protect their most valuable and…
The proliferation of malware and nefarious websites makes users cautious of downloading software or applications digitally. If they cannot determine who the publisher is or whether or not the software…
Processing paper documents may require significant physical space, time, resources, and cost. However, you can integrate cost-effective solutions for your document management and get greater control…
Every business aims to become more efficient and agile, especially as the pace of digital transformation is accelerating. Streamlining business processes and workflows is an efficient and durable way…
Robotic Process Automation (RPA) is a business strategy to automate technology that utilizes software robots to automate tasks conducted by the human workforce. Robotic process automation (RPA), also…
A Distributed Denial of Service (DDoS) attack is a non-intrusive internet attack designed to harm the targeted website. It is a malicious attempt to disrupt the regular traffic of a targeted server,…
In recent years, cyberattacks have become more refined, increasing the demand for a comprehensive cybersecurity strategy and tooling. From any government agency to the startups, every organization…
Internet of Things (IoT) devices are becoming ubiquitous while IoT services are becoming pervasive. Their success has not gone unnoticed, and the number of threats and attacks against IoT devices and…
Security in the healthcare industry is crucial as it involves patients’ personal information and private medical details. The industry is built on peoples’ trust, and any breach may result in…
In this week’s security news round-up, you’ll find two specific articles about paying hackers: one company that did and another one that didn’t. See how it panned out for them.
April 9th is world-wide IoT Day. A day to celebrate all that is the Internet of Things. IoT Day, like the Internet of Things itself is relatively new.
Before the world was deeply plunged into the world of Covid-19, the Mexican government was impacted by a cyber attack.
GlobalSign is proud to announce its partnership with DocuSign. Together, we’re helping businesses improve their efficiency, eliminate the need for paper-ridden processes, and ensure they’re meeting…
We've put together a checklist to help marketers take the proper steps to comply with CCPA – protecting their customers and avoiding huge fines.
Another week has gone by as we all work remotely. Cyber attacks persist, even in regions hardest-hit by the Coronavirus. In Italy, attackers took down the country’s social security website.
GlobalSign is inviting all Partner Program members worldwide to submit ideas for future GlobalSign blog posts. Whether you want to submit a guest blog article or simply suggest a topic or idea, we…
Remote work comes with its disadvantages. While most enterprises have been focusing on their digital transformation, many are still utilizing processes that have manual, printed, or face-to-face…
Despite COVID-19’s rapid spread and deepening hold on the world, many hackers are sadly continuing to take advantage of it. Unfortunately, this includes continued attacks on the medical and healthcare…
We’re back with another support post and this time we’re sharing our top support queries or SSL Certificates Errors and how to solve them.
Hackers. They’re a unique bunch. Naturally, they have decided to take advantage of the Coronavirus. Keep reading to see 3 ways hackers are wreaking havoc and trying to make a buck during this crisis.
It is probably not much of a surprise, but the current cybersecurity news theme is all Coronavirus, all the time.
It's a brave new world for many businesses across the globe thanks to the Coronavirus. Here are 7 things you must know before you work from home.
The Coronavirus is changing everything. Amid talk of social distancing, quarantine, and stock market crashes, though, there is one aspect of the impact of the pandemic that has been a little…
There's a solution to email threats and vulnerabilities that allows you to verify and encrypt your emails. Want to find out?
All online merchants will encounter challenges, and only those who solve problems creatively survive - the eCommerce world is cutthroat. In this article, we’ll be running through the top worst-case…
Complicated jargon and language barriers in the field of IT often mean only IT professionals can comprehend data privacy messages. Read more on cybersecurity and translation.
Electronic and digital signing are dominating today’s business processes. But can they be forged? Learn more in this blog!
Corporations Amendment (Meetings and Documents) Bill 2021 became law on February 23. Discover how digital and electronic signatures are affected.
Explore seven solutions for cyber security threats in digital banking.
Want to secure your digital documents? Learn how to easily and digitally sign PDFs with our step-by-step guide. Discover the benefits of using digital signatures, how to create them, and why they…
Discover the latest trends and how the Internet of Things is transforming industries in the Philippines.
Here’s an infographic to help guide you in making a decision when buying a code signing certificate.
Digitization, Digitalization, and Digital Transformation are critical for modern businesses. Know their similarities, differences, and how they benefit businesses in this blog.
Does certificate-based authentication work the same way as other types of authentications? Find out in this infographic!
How is Singapore adopting IoT devices? And what measures can organizations take to keep these devices and machines secure? Know the answers in this blog.
Developing apps or software for Mac OS? Make sure you digitally sign them first with GlobalSign’s Code Signing Certificate! Know why in this infographic.
Fintechs utilize AI to advance services. Learn how AI is used for maximizing investments and to spot real-time fraudulent transactions.
What is an SSL Port or Secured Port and what role does it play in internet security? Know the answers in this blog.