
- May 25, 2023
- Doug Beattie
Google's 90 Day SSL Certificate Validity Plans Require CLM Automation
If you haven’t already automated certificate management, now is the time. We explore why in this blog and how ACME can help to do so.
If you haven’t already automated certificate management, now is the time. We explore why in this blog and how ACME can help to do so.
Over the last few months Google have made announcements which could see an industry shift in the browser market. Read the blog for more details.
Google is removing the padlocking icon later this year, but does this mean websites won’t be secure?
Cybersecurity officials from the U.S. and other countries warn that cybersecurity investments are no longer optional, even horse racing isn't safe from ransomware now
We are proud to announce GlobalSign have won the Frost & Sullivan Best Practice 2022 Global Competitive Strategy Leadership Award for our TLS solutions. Read more about our win and download the…
Uber has been hacked, the European Union is proposing strict cybersecurity rules for digital-product makers, and a researcher say a new attack can unlock and start a Tesla Model Y in just seconds.
A cyberattack at InterContinental Hotels Group, a data breach involving classified NATO documents and another attack at Samsung
Numerous ransomware attacks against Latin American governments, a cyber attack on the UK's National Health Service could result in months of medical paperwork
The California Privacy Rights Act (CPRA) will soon repeal and replace the existing California Consumer Privacy Act (CCPA). Here are some of the top CPRA compliance tools that can make the journey…
Proxy servers are a practical way for individuals and organizations to enhance cybersecurity. Even so, how effective are proxy servers in cybersecurity?
Banks are increasingly moving to the digital space to serve the customers better, a need to be proactive in combating cybersecurity threats is paramount. Read five threats, including practical ways…
The smart buildings industry is marking tremendous growth. Meaning increased connectivity and IoT use, increasing the risk of cyberattacks. Read seven ways smart building owners and operators can…
You don’t want to spend weeks creating a digital product and getting no sales after launching it. We discuss useful tips for selling digital products and the main threats online sellers face in 2022.
Twitter's Ex-CSO accuses the company of cybersecurity negligence, Hackers continue to attack hospitals and critical infrastructure
In this article, we'll share fifteen web hosting security best practices that you can implement to help keep your site safe and secure.
Oops! Cyber criminals hack the wrong water company, how a teenager RickRolled his high school district, Janet Jackson music video declared a security vulnerability
Botnet attacks occur when a group of internet-enabled devices on the same network are taken over by malware. When your robot network (“botnet”) is controlled by a bad actor, they can use it to launch…
Operations teams have availability as a priority, whereas security teams are solely focused on creating a secure environment. As a result, there is often conflict between operations and security.…