
- January 07, 2025
- Jaya Mehmie
Code Signing Certificate Validity Changes: What This Means For You
The maximum validity period for Code Signing Certificates is decreasing, but what does this mean for you? Discover more in our blog.
The maximum validity period for Code Signing Certificates is decreasing, but what does this mean for you? Discover more in our blog.
In the fast-paced world of enterprise security the right partner for your digital security needs is non-negotiable. Here’s why you should choose GlobalSign.
Businesses heavily rely on digital certificates, but being crypto-agile is essential to prevent disruptions and respond to threats.
Artificial Intelligence (AI) has become a transformative force across various industries, revolutionizing the way we live and work. From improving…
From 1 September 2023, the new CA/B Forum Baseline Requirements come into effect, are you ready? Read on to learn more
PKI For Businesses: With the progressive evolution of the internet, ensuring the security of businesses' online presence has become an increasingly…
Artificial Intelligence (AI) has become a transformative force across various industries, revolutionizing the way we live and work. From improving healthcare to optimizing transportation, AI's capabilities are awe-inspiring. However, amid the advancements, it is crucial to recognize and comprehend the potential dangers that accompany this powerful technology. This blog sheds light on the importance of understanding AI risks and explores six potential dangers of artificial intelligence.
From 1 September 2023, the new CA/B Forum Baseline Requirements come into effect, are you ready? Read on to learn more
PKI For Businesses: With the progressive evolution of the internet, ensuring the security of businesses' online presence has become an increasingly formidable task, owing to the relentless advancements in cyber threats. While the battle against cyber threats remains ongoing, the risk can be significantly mitigated by incorporating Public Key Infrastructure (PKI) into your business strategy. Now before we dive deeper, let us try to understand the meaning of a Public Key Infrastructure (PKI)?
Protect your website and customers' data with a paid SSL certificate from a trusted CA. Enhance security, boost trust, and improve SEO with strong SSL encryption.
Premium SSL/TLS certificates are cryptographic certificates that protect users' data when they visit your website. They offer numerous value-added benefits like warranty coverage, stronger encryption, trust indicators, and multiple levels of validation that free SSL certificates lack.
Certificate lifecycle management can be daunting, especially if you rely on traditional manual methods, but with certificate automation, you can eliminate inefficiencies and maximise your ROI. Certificate automation refers to the process of streamlining certificate issuance, renewal, revocation, and more.
The CA/Browser Forum dictates of the way digital security is managed through its governance of digital certificates, but who are they and how do they work?
The chain of trust is the cornerstone of online communication and transaction, but how does it work, and why is it so important?
As we celebrate World Wide Web Day, we discuss the key components of establishing digital trust, and its importance in online security.
Join us for your monthly round-up as we discuss the already infamous CrowdStrike outage, the AT&T data breach and much more.
Descubre cómo gestionar certificados digitales en entornos híbridos y multicloud con las mejores prácticas y estrategias eficaces.
Security risk management is no longer optional for businesses in today’s digital world. Learn about the role of risk management and how to implement it.
Revocation checks are used to provide checks and balances and assure trust in the digital space. Join us as we discuss CRL, OCSP and OCSP-stapled checking.
Discover updates to GlobalSign’s ACME service for issuing intranet SSL certificates, what it means and why they are important.
Learn how to automate your DevOps pipelines while keeping security at the forefront of your development using GlobalSign’s PKI solutions.
X.509 certificates are a key component of cybersecurity infrastructure. Read more to discover what they are, their role and importance.
Root Ubiquity is a seal of trust among security providers. This blog explores what it is and why it’s so important.
Avoid disruptions to your business by switching to GlobalSign, and ensure that your certificates are publicly trusted by all major browsers.
In June, we’ve seen multi-factor authentication back in the spotlight as a result of a major breach in Snowflake, further updates on Lockbit’s resurgence, and moves to improve cybersecurity for…
ESG initiatives encourage ethical operations in business. Discover how PKI supports ethical operations in business practices.
This blogs discusses what organizations should consider when choosing the right Certificate Automation Manager to address certificate challenges
Explore how IoT network security begins with secure device enrolment and how industry leaders must prioritize IoT security.
Artificial Intelligence (AI) has become a transformative force across various industries, revolutionizing the way we live and work. From improving healthcare to optimizing transportation, AI's…
From 1 September 2023, the new CA/B Forum Baseline Requirements come into effect, are you ready? Read on to learn more
PKI For Businesses: With the progressive evolution of the internet, ensuring the security of businesses' online presence has become an increasingly formidable task, owing to the relentless…
Do you know what SSL/TLS certificates you have in your organization? Read more to learn about the certificate inventory tool that could help you.
As more and more Enterprises are adopting DevOps culture there has been a significant rise in the usage of Container Services. According to the CNCF Survey 2020 , 92% of respondents say they use…
In this increasingly hyperconnected world, digital transformation helps improve the productivity of the organization. Technological innovation continues to support organizations in carrying out their…
Security is a critical concern for today's enterprises and their customers, especially with many employees pivoting to remote work over the past couple of years. To protect their most valuable and…
Processing paper documents may require significant physical space, time, resources, and cost. However, you can integrate cost-effective solutions for your document management and get greater control…
The proliferation of malware and nefarious websites makes users cautious of downloading software or applications digitally. If they cannot determine who the publisher is or whether or not the software…
Every business aims to become more efficient and agile, especially as the pace of digital transformation is accelerating. Streamlining business processes and workflows is an efficient and durable way…
Robotic Process Automation (RPA) is a business strategy to automate technology that utilizes software robots to automate tasks conducted by the human workforce. Robotic process automation (RPA), also…
A Distributed Denial of Service (DDoS) attack is a non-intrusive internet attack designed to harm the targeted website. It is a malicious attempt to disrupt the regular traffic of a targeted server,…
In recent years, cyberattacks have become more refined, increasing the demand for a comprehensive cybersecurity strategy and tooling. From any government agency to the startups, every organization…
Internet of Things (IoT) devices are becoming ubiquitous while IoT services are becoming pervasive. Their success has not gone unnoticed, and the number of threats and attacks against IoT devices and…
What's the difference between SSL and TLS? And how do you know which one is right for you? Everything is explained in this blog.
Keep reading to find out more about the latest directive affecting the security industry in the EU. For a quick list of all the abbreviations scroll down to the PSD2 Glossary at the end of the post.
One of the common pitfalls a company might fall into is assuming that its cybersecurity solutions are maintained and managed via standard risk assessments.
GlobalSign conducted a survey earlier this year to better understand how, and why, companies are using Public Key Infrastructure (PKI) based certificates. Nearly 750 people participated in the survey,…
As a freelancer, balancing your need for privacy with your desire to get work can be difficult. Often, so many questions arise: Should you share personal information that can be used to identify you…
This has been another busy year for hackers. As for what we can expect in 2020, only time will tell. In the meantime, we’ve asked some of GlobalSign’s brightest minds to share their thoughts.
While getting people to trust online shopping was a huge hurdle for e-commerce 20 years ago, today’s online shoppers often think nothing of filling out forms and providing data.
If you don’t work in IT, chances are low you’ve come across the acronym “PKI.” You’re probably not familiar with the concept or – more likely – you’ve never even heard of it.
The personal records of nearly every single resident of Ecuador, including 6.7 million children - even infants -- were exposed due to a colossal data breach. That works out to
Building an online store should be an enjoyable and exciting experience, but there are serious issues that must be considered to ensure the business – and customers – are kept as safe as possible.…
Scams are an integral part of the online world. There are hundreds of different attack strategies used by cybercriminals. One of the classic scamming techniques is phishing. While an older strategy,…
There was no black out, but it could have been a DDoS attack...
Today there’s a huge wave toward protecting consumer privacy – in Congress, with the GDPR, etc. – but how can we protect user privacy on the web without establishing the identity of the websites that…
There’s no denying the crisis created by a sudden rise in automated phishing attacks. And it’s happening with more convincing content and greater accuracy due to Artificial Intelligence (AI), Machine…
IT is at the heart of operations for a majority of small businesses, so robust security measures are vital. For those just starting out, here are some top tips.
Understand the impact of global cybersecurity regulations like eIDAS 2.0 and the importance of machine identity in the IoT era. Stay informed about the advancements shaping the future of digital trust…
Uncover the undisclosed expenses tied to selecting the wrong Certificate Authority. Learn how this decision impacts your business and finances. Navigate the pitfalls wisely.
Unravel the complexities of Digital Identity and IoT Security with concise answers to the top 10 frequently asked questions. Enhance your understanding and fortify your online security measures.
CAs are vital for maintaining cybersecurity - protecting Identities in a landscape perpetually exposed to new threats enabled by emerging technologies.
Uncover the fruits of establishing cybersecurity partnerships and how combining digital identity management and IoT security can benefit you and your clients!
Do you want to learn about Certificate Authorities? Check out this glossary to understand the key terms.
Do you want to learn about Certificate Authorities? Check out this glossary to understand the key terms.
Do you want to learn what an Identity Authority does? Check out this blog to understand the role of Identity Authorities in maintaining digital IDs.
Promote CyberSecurity and CyberSafety in your critical infrastructure! Here's how your organisation can properly prepare against CyberCrime.
Help your executives understand the evolving legal landscape and their compliance obligations related to CyberCrime, CyberSafety, and CyberWarfare.
Digital certificates are the rock of trust for businesses. If you don't have an airtight CLM process, you could experience costly downtime and breaches.
Tired of seeing "SSL Certificate Error" messages on your website? Don't worry, we've got you covered. This guide will walk you through common SSL certificate issues and provide easy-to-follow…
This helpful guide breaks down what an electronic seal is, and how to choose one that is right for your organization.
E-signatures play a central role in business agreements. Here we discuss how organizations can make the most of contract management trends and how GlobalSign’s document signing solutions can help you.…
In today's digital landscape, SSL certificates are essential for businesses and individuals in the Philippines. SSL, or Secure Sockets Layer, ensures the secure transmission of data between your…