- November 22, 2023
- Sarah Topping
DevOps Teams Need to Reprioritize Security - Here’s How
DevOps teams can no longer treat security as an afterthought, but reprioritizing is a huge task. Learn the best practices for prioritizing security.
DevOps teams can no longer treat security as an afterthought, but reprioritizing is a huge task. Learn the best practices for prioritizing security.
Let’s take a look at some of the key reasons why IT teams should implement automation within their organization.
In this article, we look at how digital identity verification plays a key role in the eIDAS 2.0 regulation.
GlobalSign’s successful completion of the North American Energy Standards Board (NAESB) Authorized Certification Authority accreditation audit.
Last week the White House’s web team announced that it was enabling HTTPS by default, also known as Always On SSL (AOSSL). The FTC did the same thing a week before that. AOSSL isn’t a new concept for…
FREAK is a new man-in-the-middle (MITM) vulnerability discovered by a group of cryptographers at INRIA, Microsoft Research and IMDEA. FREAK stands for “Factoring RSA-EXPORT Keys.” The vulnerability…
As stated by the CA/B Forum, no later than 1 April 2015, certificates must be limited to a maximum validity of 39 months.
t's great to see the abundance of cyber and information security discussion and activity by regulators of late. Particularly in January, the FTC released a report providing guidance to business for…
System integrator Avisi enables multi-factor authentication for Dutch notaries when accessing KNB platform
It's clear digital certificates can be a great option for your security projects (e.g., authentication, digital signatures, secure email), but once you've decided on a certificate-based solution, you…
Lenovo enables man-in-the-middle attacks via Superfish Adware- find out how!
It seems you can't go a day without hearing about the Internet of Things (IoT). While there's no questioning the scale and impact it's going to have on our life as we know it, there is one major…
With the growing connectedness of all things great and small, the need for trusted identities will take center stage in 2015...
Everyone's talking about the Sony megahack, and for good reason. The sheer amount of data (up to 11 TB), and the contents (passwords, employee social security numbers, corporate secrets, emails) have…
When we first reported on the POODLE (Padding Oracle On Downgraded Legacy Encryption) vulnerability in October, it was believed to only affect the SSLv3 protocol. However, the vulnerability, which…
We're looking at some of the top security advancements of code signing certs such as two-factor authentication.
Tackling some digital signature and S/MIME FAQs, including what happens to encrypted emails after the certificate expires, how to streamline public key exchange, and how PDF and Office digital…
How online-shops can convince customers to online Christmas shopping by providing internet security (SSL, https, padlock, green address bar).