
- January 07, 2025
- Jaya Mehmie
Code Signing Certificate Validity Changes: What This Means For You
The maximum validity period for Code Signing Certificates is decreasing, but what does this mean for you? Discover more in our blog.
The maximum validity period for Code Signing Certificates is decreasing, but what does this mean for you? Discover more in our blog.
In the fast-paced world of enterprise security the right partner for your digital security needs is non-negotiable. Here’s why you should choose GlobalSign.
Businesses heavily rely on digital certificates, but being crypto-agile is essential to prevent disruptions and respond to threats.
Artificial Intelligence (AI) has become a transformative force across various industries, revolutionizing the way we live and work. From improving…
From 1 September 2023, the new CA/B Forum Baseline Requirements come into effect, are you ready? Read on to learn more
PKI For Businesses: With the progressive evolution of the internet, ensuring the security of businesses' online presence has become an increasingly…
Artificial Intelligence (AI) has become a transformative force across various industries, revolutionizing the way we live and work. From improving healthcare to optimizing transportation, AI's capabilities are awe-inspiring. However, amid the advancements, it is crucial to recognize and comprehend the potential dangers that accompany this powerful technology. This blog sheds light on the importance of understanding AI risks and explores six potential dangers of artificial intelligence.
From 1 September 2023, the new CA/B Forum Baseline Requirements come into effect, are you ready? Read on to learn more
PKI For Businesses: With the progressive evolution of the internet, ensuring the security of businesses' online presence has become an increasingly formidable task, owing to the relentless advancements in cyber threats. While the battle against cyber threats remains ongoing, the risk can be significantly mitigated by incorporating Public Key Infrastructure (PKI) into your business strategy. Now before we dive deeper, let us try to understand the meaning of a Public Key Infrastructure (PKI)?
Protect your website and customers' data with a paid SSL certificate from a trusted CA. Enhance security, boost trust, and improve SEO with strong SSL encryption.
Streamline cert management! Our comprehensive guide simplifies the switch to automated certificates, saving you time and boosting security.
Electronic Signatures and Digital Signatures sound synonymous but we share the true meaning of each term as well as how they should be used.
DevOps teams are facing new challenges to securing their environments. Let’s explore how shift-left practices can address them.
Explore why Qualified Trust Services and Qualified Electronic Signatures and Seals are a necessity, and their role in the Digital Identity Wallet.
In this blog we will discuss how outdated encryption methods can be detrimental to businesses and explore proactive solutions.
In this blog, we shall discuss PSD2 and PSD3 and how the development will fortify the European financial sector.
In this blog, we explore 10 steps to enabling better security and efficiency that DevOps environments should be considering
In this blog we examine how businesses can use digital signing to protect themselves against the growing threat of AI attacks.
Boeing breaches, anonymous attacks, critical concern for infrastructure services and much more in this month’s NewsScam.
In this blog, we look at how the catalyst inducing events from the past year are shaping what could be in store for 2024.
Let’s compare Qualified Trust Seals to other types of electronic seals and why they are important in the evolving document authentication landscape?
We take a look at how businesses are implementing digital signature solutions to meet growing demands.
Discover how GlobalSign and AppViewX have collaborated together to streamline machine identity security.
DevOps teams can no longer treat security as an afterthought, but reprioritizing is a huge task. Learn the best practices for prioritizing security.
Malicious actors are finding new ways to exploit businesses using automation. The good news is, you can use it to fight back. Read on to learn more.
Let’s take a look at some of the key reasons why IT teams should implement automation within their organization.
In this article, we look at how digital identity verification plays a key role in the eIDAS 2.0 regulation.
So, you want to be innovative and stay on top of such complex markets as cybersecurity… but the competition is tough. How do you take the next step? One of the best ways your company can achieve more…
GlobalSign’s IoT team has seen an increasing number of customers choosing the Azure IoT Hub platform for its purpose-built IoT infrastructure, integrated environments, developer tools, and Platform as…
The GlobalSign IoT Solutions Group is announcing the launch of an IoT developer portal designed specifically to assist IoT developers with device identity integrations.
A division of 451 Research, the organization asked its members about their biggest security concerns. As illustrated below, the top two included user behavior and phishing. Endpoint security, the IoT…
One of the most essential pieces of security is consent and validation of individuals – which is why so many companies are using biometric input devices
Card data breaches are worrying enough, but they also coincide with a rather concerning trend; the number of business to fully comply with the Payment Card Industry Data Security Standard dropped in…
Technology always keeps us on our toes. And while constant change and innovation is exciting, keeping up can be a double-edged sword. Perhaps the biggest challenge facing businesses today is privacy.
When people think about malware, it's usually in the context of cyberattacks that are trying to steal personal information or bring down a website. But today, with so many new devices gaining…
Together, GlobalSign IoT and Xage Security deliver the ultimate in secure IIoT. The partnership illustrates the novel and successful combination of two distinct technologies and makes obsolete the…
Although many business executives regularly assess the risks that could threaten their enterprises, they may not think online fraud is a threat. It may especially get overlooked at smaller operations.…
According to research from Markets and Markets, the artificial intelligence industry is expected to grow to $190 billion by 2025. By the year 2021, it is estimated that three-quarters of commercial…
Following the EU Commission’s announcement on 18 April 2019, businesses may or may not be aware the e-invoicing Directive came into force...
Security-by-design isn’t a new concept. It’s the idea of addressing security concerns, considerations and best practices as early as possible in the IoT product, application or network development to…
Together, GlobalSign IoT and Xage Security deliver the ultimate in secure IIoT. The partnership illustrates the novel and successful combination of two distinct technologies and makes obsolete the…
With cybercrime all around, businesses should invest correctly in cybersecurity, not just to mitigate financial loss, but to maintain stakeholder trust.
Website security plays a crucial role in establishing online trust and protecting users’ data. SSL/TLS certificates encrypt data communications between browsers and websites, ensuring that it can’t be…
Discover how AI and ML are revolutionising digital identity security, enhancing threat detection and user authentication. Learn more and protect your digital identities now!
In terms of potential business revenue, find the real value in raising cybersecurity investments through solution upgrades and new technology deployments.
AI & ML redefine digital identity security in 2024! Explore how these innovations fight fraud & protect you. Read our analysis & uncover the future of cybersecurity.
Not all SSL/TLS certificates are created equal! Many businesses have opted for free SSL/TLS certificates over paid versions. There is an obvious advantage in choosing a free SSL/TLS certificate over a…
People think that Blockchain and PKI are rivals, but each are better used in different things. In what situations would PKI be the right technology to adopt?
Explore the evolving cybersecurity landscape in 2024, uncovering challenges and strategic opportunities amid digital identity threats. Stay ahead, fortify defenses, and navigate the tide of…
This comprehensive guide covers five strategies that enable MSPs to leverage identity management solutions and capitalise on the burgeoning digital identity market, enhancing both their service…
Here are some factors to consider when choosing a provider for your Qualified Electronic Signatures (QES).
The Zero Trust security model, centered on the principle "never trust, always verify," challenges traditional security assumptions by treating all users and devices as potential threats, necessitating…
Revisit strategic security goals. Consider how PKI helps with encryption, authentication, access control, CLM, compliance, and regulations.
In this article, we take a look at the different types of electronic signatures used for eIDAS and their appropriate use cases for each type.
In this blog we will explore Post-Quantum-Safe certificates, what they will look like and compare the difference with the certificates we use today.
Explore the vital need for a 2024 digital identity strategy in our latest blog. Discover insights on the evolving digital landscape, covering hybrid work, IoT, quantum computing, and e-commerce.