
- February 18, 2021
- Sam Bocetta
Privacy with Personality: The Trend Towards Online Pseudonymity
It’s possible that in a few years, we will enter a new age of digital privacy. In this article, we will discuss the increasing danger of sharing…
It’s possible that in a few years, we will enter a new age of digital privacy. In this article, we will discuss the increasing danger of sharing…
If you don’t have the right online security measures in place, you risk your business falling victim to an attack like whaling, which usually results…
The new year promises new innovations and trends – in many ways, it will be the start of a new era. In this article we'll walk you through the…
There are a number of benefits to using a management service for your SSL Certificates, but today we're focusing specifically on how they can help prevent certificate expiration.
Real life examples of how our customers are using certificates for user, machine, and device authentication.
After introducing HTTPS by default on all its services, as well as promoting the HTTPS Everywhere initiative, Google is encouraging stronger security once again by reviewing their algorithms to reward…
Answers to more questions from our digital signature webinar, including the software you need to apply digital signatures and how to apply them.
This blog includes a few questions and answers we didn't have a chance to cover in our recent digital signature webinar, including what does a recipient need to receive a signed document and who…
I'm going to walk through the simple steps it takes to apply a digital signature using one of the industry's leading PDF editing, markup, and collaboration software, BlueBeam Revu.
Security of a website and its infrastructure play a very important role in the trustworthiness of a site. The 2014 OTA Honor Roll helps promote SSL best practices.
OpenSSL published a security advisory highlighting six new vulnerabilities with fixes available.
Learn how an insurance firm wanted to switch from paper-based workflow to an electronic workflow to reduce the turnaround time for policy application and delivery!
While the OpenSSL code may be freely available, the foundation needs developers, tools, QA and oversight to produce the best code – and that carries a cost, just as it does for the rest of us.
There are a lot of authentication solutions available, so to help you decide which is the best fit for you, we've created a list of considerations based on our conversations with customers like you.
IT industry trends in 2014 - Increase in demand for online security, focus on customer education and internal network security.
To help you decide if certificate-based authentication is right for you, we've listed some of their key benefits.
One of the biggest risks from the Heartbleed bug was the risk of username/password leaks. This blog explores how multi-factor authentication could have helped mitigate the risk.
Single factor authentication is no longer enough for organizations. Here's three reasons you should consider two-factor authentication solutions.