
- April 08, 2021
- Sebastian Schulz
What Makes S/MIME Certificates Trustworthy?
In this blog, we discuss the (evolving) requirements for S/MIME and the attempt to create a standard.
In this blog, we discuss the (evolving) requirements for S/MIME and the attempt to create a standard.
IoT device manufacturers face many challenges in securely launching their products. First and foremost is the ability to provision device identities,…
A massive data breach at Facebook, reports of a "significant" attack at the European Commission, and the Golden Chicken ransomware gang is doing more…
In these days of constant impersonal email communication BEC has become a common threat. To minimize your company's risk, try implementing the following strategies.
The good news: breaking up with your current SSL provider isn’t so hard to do. And to make it as simple as possible, we’ve created a handy checklist for you.
Learn how becoming a GlobalSign Certfied Regional Partner helped Italy-based Sistematica expand its business to include customers in the payment, telecom, and insurance industries.
It hasn’t been a great start to the New Year for several UK organizations, as this week numerous new cyber attacks were revealed.
Check out these tips for eCommerce stores looking to create a safer online payment experience for their customers.
On Wednesday, there was a massive global takedown of the Emotet botnet, which has been one of the most pervasive cyber threats over the last six years.
Each month in 2021, we’ll be introducing you to a member of the GlobalSign team. Follow along and meet the people working hard behind the scenes to bring you industry-leading PKI and identity…
Responding to the COVID crisis has put the cybersecurity world to the test. Unfortunately, there is a significant shortage of trained cybersecurity professionals, and this fact is not lost on the…
Advanced architectural models for certificate protection are emerging that are designed to safeguard IoT device identities against supply chain threats.
Miraculously, we’ve made it through one whole week without a large-scale ransomware attack. How refreshing! Naturally, there are a few smaller-scale events being reported. Here's a run-down.
Smishing text message scams are not new. But it’s important to remember: they are not going to disappear any time soon. All companies should include smishing as a priority in their cybersecurity…
In Covid-19 news, CheckPoint says cybercriminals on the dark web have been advertising available Coronavirus vaccines at $1,000 a pop in bitcoin. Keep reading for more of this week's biggest…
According to the 2020 State of the Cloud Report from Flexera, 93% of enterprises have a multi-cloud strategy. As the number, complexity, and sophistication of cloud infrastructures has increased,…
Three weeks after the Solar Winds Orion hack, the shock and awe seems to be wearing off and reality is setting in. It's been described as “nothing short of a virtual invasion by the Russians into…
Cybersecurity and cyber resilience are two strategies to safeguard sensitive information such as a user’s personal and financial data, but they achieve their goals during different stages of a cyber…