
- January 07, 2025
- Jaya Mehmie
Code Signing Certificate Validity Changes: What This Means For You
The maximum validity period for Code Signing Certificates is decreasing, but what does this mean for you? Discover more in our blog.
The maximum validity period for Code Signing Certificates is decreasing, but what does this mean for you? Discover more in our blog.
In the fast-paced world of enterprise security the right partner for your digital security needs is non-negotiable. Here’s why you should choose GlobalSign.
Businesses heavily rely on digital certificates, but being crypto-agile is essential to prevent disruptions and respond to threats.
Artificial Intelligence (AI) has become a transformative force across various industries, revolutionizing the way we live and work. From improving…
From 1 September 2023, the new CA/B Forum Baseline Requirements come into effect, are you ready? Read on to learn more
PKI For Businesses: With the progressive evolution of the internet, ensuring the security of businesses' online presence has become an increasingly…
Artificial Intelligence (AI) has become a transformative force across various industries, revolutionizing the way we live and work. From improving healthcare to optimizing transportation, AI's capabilities are awe-inspiring. However, amid the advancements, it is crucial to recognize and comprehend the potential dangers that accompany this powerful technology. This blog sheds light on the importance of understanding AI risks and explores six potential dangers of artificial intelligence.
From 1 September 2023, the new CA/B Forum Baseline Requirements come into effect, are you ready? Read on to learn more
PKI For Businesses: With the progressive evolution of the internet, ensuring the security of businesses' online presence has become an increasingly formidable task, owing to the relentless advancements in cyber threats. While the battle against cyber threats remains ongoing, the risk can be significantly mitigated by incorporating Public Key Infrastructure (PKI) into your business strategy. Now before we dive deeper, let us try to understand the meaning of a Public Key Infrastructure (PKI)?
Protect your website and customers' data with a paid SSL certificate from a trusted CA. Enhance security, boost trust, and improve SEO with strong SSL encryption.
Premium SSL/TLS certificates are cryptographic certificates that protect users' data when they visit your website. They offer numerous value-added benefits like warranty coverage, stronger encryption, trust indicators, and multiple levels of validation that free SSL certificates lack.
Certificate lifecycle management can be daunting, especially if you rely on traditional manual methods, but with certificate automation, you can eliminate inefficiencies and maximise your ROI. Certificate automation refers to the process of streamlining certificate issuance, renewal, revocation, and more.
In this blog, we will explore why it’s important to secure Docker containers using SSL/TLS certificates, and how to do it.
If you haven’t already automated certificate management, now is the time. We explore why in this blog and how ACME can help to do so.
In this blog we look at how PKI and Zero Trust can work together to strengthen security posture.
Over the last few months Google have made announcements which could see an industry shift in the browser market. Read the blog for more details.
Google is removing the padlocking icon later this year, but does this mean websites won’t be secure?
Document sealing and signing has been through an evolution. Discover how our Qualified Signing Service (QSS) can help your business be more secure.
Explore the technologies that are available to ensure secure and safe email communications such as S/MIME.
Multi-factor authentication (MFA) is one of the most simple-yet-effective ways to bolster security. Don’t believe us, here are five reasons why.
Read all the newest Cybersecurity headlines including phone charging during your travels, and of course, all about scandal around the Pentagon cybersecurity incident caused by a 21-year-old, and so…
Read how IoT is revolutionizing every facet of supply chain management and how logistics companies are capitalizing on IoT benefits.
Replacing paper-based transactions can positively impact a company’s environmental footprint, read our blog to learn more.
It has been over 3 years since the pandemic accelerated technological developments and sparked new uses for pre-existing IoT technology. We take a look at how this has continued to evolve in the…
The Internet of Things (IoT) technology has made our lives more efficient in every aspect, but with this comes risk. In this article, we take a look at the security protocols to help secure IoT…
In this blog, we look at what security measures enterprises can to take to protect websites from cyber attacks.
The key to certificate management is tools and integrations. Learn more about GlobalSign’s PKI as a Service (PKIaaS) Connector for ServiceNow.
Those that social engineer are hackers, conducting phishing-like scams with the objective of gaining enough personal information through confidence-instilling questions and exchanges.
We need to know who we’re interacting with online – who electronically signed that document, who really sent that email, who’s behind this site I’m about to log into.
In addition to instant messaging and augmented reality, we’re also now beginning to see vehicles (especially in the luxury market) offering features like self-parking, adaptive cruise control,…
Since its introduction nearly 10 years ago, blockchain technology has taken the world by storm. We'll look at ways it can improve eCommerce.
Using a free VPN? Nothing is free these days and John Mason is here to tell you exactly how these free VPNs use your data to make money. You might not like what you find out about your privacy.
Network hacks are already incredibly common and increasing in severity and frequency each year. Statistics from a joint 2017 study from Accenture and Ponemon Institute found an average company…
Any business could benefit from having a penetration test (commonly referred to as ‘pen test’) carried out. However, it is something that some companies may put off or avoid entirely due to…
You don’t have to be a genius to understand the appeal of smart cities. As the IoT field continues to expand and innovate, the potential benefits and efficiencies gained do as well. One area…
According to Statista, within two years the discrete manufacturing, transportation & logistics and utilities industries will spend $40 billion each on IoT platforms, systems and services. Those are…
The difference between privacy and security is almost as debated as the chicken and the egg argument. Which came first? What does each mean? You might even learn that they aren't so different after…
In this blog post we tackle the topic of cybersecurity in regard to partnerships between financial institutions and FinTech.
This year, ransomware has definitely topped most talked about cyber-attack, so we go back to the basics and ask, 'what is a ransomware attack?'. Find out in this post.
The costs of cyber crime are now estimated at more than $1 trillion, constantly rising. We've summarised the best online banking crime statistics.
One such market that’s going paperless due to the benefits it offers is education, as well as the companies serving academia.
Every time you browse the internet, your digital footprint is collected and stored by third-parties. Learn what data is kept, how it’s used, and how you can stop it.
With cybercrime all around, businesses should invest correctly in cybersecurity, not just to mitigate financial loss, but to maintain stakeholder trust.
Website security plays a crucial role in establishing online trust and protecting users’ data. SSL/TLS certificates encrypt data communications between browsers and websites, ensuring that it can’t be…
Discover how AI and ML are revolutionising digital identity security, enhancing threat detection and user authentication. Learn more and protect your digital identities now!
In terms of potential business revenue, find the real value in raising cybersecurity investments through solution upgrades and new technology deployments.
AI & ML redefine digital identity security in 2024! Explore how these innovations fight fraud & protect you. Read our analysis & uncover the future of cybersecurity.
Not all SSL/TLS certificates are created equal! Many businesses have opted for free SSL/TLS certificates over paid versions. There is an obvious advantage in choosing a free SSL/TLS certificate over a…
People think that Blockchain and PKI are rivals, but each are better used in different things. In what situations would PKI be the right technology to adopt?
Explore the evolving cybersecurity landscape in 2024, uncovering challenges and strategic opportunities amid digital identity threats. Stay ahead, fortify defenses, and navigate the tide of…
This comprehensive guide covers five strategies that enable MSPs to leverage identity management solutions and capitalise on the burgeoning digital identity market, enhancing both their service…
Here are some factors to consider when choosing a provider for your Qualified Electronic Signatures (QES).
The Zero Trust security model, centered on the principle "never trust, always verify," challenges traditional security assumptions by treating all users and devices as potential threats, necessitating…
Revisit strategic security goals. Consider how PKI helps with encryption, authentication, access control, CLM, compliance, and regulations.
In this article, we take a look at the different types of electronic signatures used for eIDAS and their appropriate use cases for each type.
In this blog we will explore Post-Quantum-Safe certificates, what they will look like and compare the difference with the certificates we use today.
Explore the vital need for a 2024 digital identity strategy in our latest blog. Discover insights on the evolving digital landscape, covering hybrid work, IoT, quantum computing, and e-commerce.