GlobalSign
  • Contact Us
  • 1-877-775-4562
  • Atlas Login
  • GCC Login
  • EN | United States
  • Enterprise
    • Certificates
      • Managed SSL / TLS
      • Authentication
      • Digital Signatures
      • Secure Email
      • NAESB Compliance
      • Qualified Trust Services
      • Code Signing
    • Management and Automation
      • Atlas
      • Managed PKI Platform
      • Auto Enrollment Gateway (AEG)
      • ACME Automated Certificate Management
      • Atlas Discovery
      • Mobile Devices
      • PKI for DevOps
      • GMO Sign
    • CA Services
      • Custom CA / Private PKI
      • Trusted Root
      • Timestamping
      • Hosted OCSP
      • See GlobalSign’s full line of solutions
  • IoT
    • IoT Identity Platform
      • IoT Edge Enroll
      • IoT CA Direct
    • IoT Device Identity Lifecycle Management
    • IoT Device Certificates
    • Hosted OCSP
    • IoT Developer Program
    • IoT Partner Program
      • IoT Chip to Cloud Integration Blueprint
      • AWS IoT Core Integration
    • MS Azure IoT Hub Integration
    • 5G for IoT
  • Partners
    • Global Partnerships
    • Certified Regional Partners
    • Our Partners
  • Resources
    • Datasheets
    • White Papers & eBooks
    • Case Studies
    • How-to Videos
    • Webinars
    • Information Center
    • API Documentation
  • Support
  • Company
    • News & Events
    • Blog
    • Leadership
    • Careers
    • Locations & Contact
    • Legal Repository
    • Corporate Policies
    • Customers
  • Shop
    Buy Individual Certificates
    • SSL/TLS CERTIFICATES
      • Domain Validated (DV)
      • Organization Validated (OV)
      • Extended Validation (EV)
      • Wildcard
      • Multi-Domain / SANs
      • View More
    • CLIENT CERTIFICATES
      • Document Signing
      • Code Signing
      • S/MIME Certificates
    • SPECIALTY CERTIFICATES
      • EIDAS Electronic Signatures
      • PSD2 Digital Certificates
      • Belgian Government Services
      • NAESB
      • AEC Digital Signature
      • FDA Certificates (21 CFR Part 11)
      • FDA ESG
    • PKI Solutions

      Did you know you can automate the management and renewal of every certificate?

      Learn More

GlobalSign Blog

  • March 15, 2023
  • Patrick Nohe

Google's 90 Day Certificate Validity Plans Require CLM Automation

If you haven’t already automated certificate management, now is the time. We explore why in this blog and how ACME can help to do so.

  • March 14, 2023
  • Martin Lowry

Mitigate Industrial IoT Security Challenges with PKI Solutions

Industrial IoT has become very attractive targets to cyber criminals, but how can you mitigate IIoT security challenges with PKI solutions? Discover…

  • February 17, 2023
  • Melanie Faller

NewsScam – The Monthly Round Up for February

The monthly round up of cybersecurity news, including DDoS, impacts of previous attacks, takedowns, close shaves and focus on the education sector and…

  • Latest Posts
  • Solutions
    • Certificate Automation
    • Trusted Identities
    • Certificate Management
    • Code Signing
    • Digital Signatures
    • Email Security
    • Internet of Things
    • Partners
    • SSL/TLS
    • Qualified Trust
  • Industry
    • DevOps
    • Healthcare
    • Financial
    • Government
    • AEC
    • Energy
    • Insurance
    • Automotive
    • Aerospace
  • Security News
  • Search Blog

  • 7 Best Privacy Tools for CPRA Compliance in 2022

    7 Best Privacy Tools for CPRA Compliance in 2022

    August 31, 2022

    The California Privacy Rights Act (CPRA) will soon repeal and replace the existing California Consumer Privacy Act (CCPA). Here are some of the top CPRA compliance tools that can make the journey…

  • Why Are Proxy Servers Important for Cybersecurity?

    Why Are Proxy Servers Important for Cybersecurity?

    August 31, 2022

    Proxy servers are a practical way for individuals and organizations to enhance cybersecurity. Even so, how effective are proxy servers in cybersecurity?

  • Top Five Cyber Security Threats to Digital Banking and How to Guard Against Them

    Top Five Cyber Security Threats to Digital Banking and How to Guard Against Them

    August 31, 2022

    Banks are increasingly moving to the digital space to serve the customers better, a need to be proactive in combating cybersecurity threats is paramount. Read five threats, including practical ways…

  • 7 Ways to Boost Cyber Resilience in the Smart Building Industry

    7 Ways to Boost Cyber Resilience in the Smart Building Industry

    August 30, 2022

    The smart buildings industry is marking tremendous growth. Meaning increased connectivity and IoT use, increasing the risk of cyberattacks. Read seven ways smart building owners and operators can…

  • How to Sell Digital Products: Tips & Threats for Online Sellers in 2022

    How to Sell Digital Products: Tips & Threats for Online Sellers in 2022

    August 26, 2022

    You don’t want to spend weeks creating a digital product and getting no sales after launching it. We discuss useful tips for selling digital products and the main threats online sellers face in 2022.

  • Cybersecurity News Round-Up: Week of August 22, 2022

    Cybersecurity News Round-Up: Week of August 22, 2022

    August 26, 2022

    Twitter's Ex-CSO accuses the company of cybersecurity negligence, Hackers continue to attack hospitals and critical infrastructure

  • Everything You Need to Know About Web Hosting Security

    Everything You Need to Know About Web Hosting Security

    August 24, 2022

    In this article, we'll share fifteen web hosting security best practices that you can implement to help keep your site safe and secure.

  • Cybersecurity News Round-Up: Week of August 15, 2022

    Cybersecurity News Round-Up: Week of August 15, 2022

    August 19, 2022

    Oops! Cyber criminals hack the wrong water company, how a teenager RickRolled his high school district, Janet Jackson music video declared a security vulnerability

  • Future-Proofing Your Cybersecurity Strategy for Botnet Attacks

    Future-Proofing Your Cybersecurity Strategy for Botnet Attacks

    August 19, 2022

    Botnet attacks occur when a group of internet-enabled devices on the same network are taken over by malware. When your robot network (“botnet”) is controlled by a bad actor, they can use it to launch…

  • Resolving the Conflict Between Availability and Security in IT

    Resolving the Conflict Between Availability and Security in IT

    August 18, 2022

    Operations teams have availability as a priority, whereas security teams are solely focused on creating a secure environment. As a result, there is often conflict between operations and security.…

  • 10 Tips for Hiring and Retaining IT Employees

    10 Tips for Hiring and Retaining IT Employees

    August 17, 2022

    As the saying goes, "people are your most important asset." This is especially true in the field of information technology (IT), where a company's ability to hire and retain top talent can be the…

  • Cybersecurity News Round-Up: Week of August 8, 2022

    Cybersecurity News Round-Up: Week of August 8, 2022

    August 12, 2022

    The UK feeling pained following a ransomware attack on the NHS, 18 tech & cyber companies launch new security standard for sharing cybersecurity information

  • Public Key Infrastructure: Five Courses Worth Considering for Cybersecurity Professionals

    Public Key Infrastructure: Five Courses Worth Considering for Cybersecurity Professionals

    August 08, 2022

    Ransomware attacks impacted 66% of businesses in the past year – a nearly 80% increase from last year. For cybersecurity professionals, understanding the ins and outs of PKI can help them bolster…

  • Top 10 Cookie Consent plugins for WordPress

    Top 10 Cookie Consent plugins for WordPress

    August 05, 2022

    We have researched all cookie consent plugins available on WordPress's marketplace and compiled a list of the top 10 plugins for cookie consent.

  • Everything You Need to Know About NetOps, DevOps, NetSecOps, and DevSecOps

    Everything You Need to Know About NetOps, DevOps, NetSecOps, and DevSecOps

    August 04, 2022

    Let’s talk about what exactly NetOps, DevOps, NetSecOps, and DevSecOps are and how these combined IT approaches are changing how teams work and develop.

  • ← Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6 (current)
  • 7
  • 8
  • 9
  • …
  • 59
  • Next →
>

GlobalSign Blog & News

Connect with us

Latest Tweets

Tweets by globalsign

GlobalSign is the leading provider of trusted identity and security solutions enabling businesses, large enterprises, cloud service providers and IoT innovators around the world to secure online communications, manage millions of verified digital identities and automate authentication and encryption. Its high-scale Public Key Infrastructure (PKI) and identity solutions support the billions of services, devices, people and things comprising the Internet of Everything (IoE).

Follow Us
About
  • Company Profile
  • News & Events
  • Blog
  • Legal Repository
  • Corporate Policies
  • Locations & Contacts
  • EN / Products
Tools
  • SSL Server Test
  • Atlas Discovery
Learning
  • Support Site
  • SSL Information Center
  • Resources
  • Customer Stories
Contact
  • Sales-us@globalsign.com
  • 1-877-775-4562
  • Open Support Ticket
  • Systems Alerts
EN | United States

Click the downloads icon in the toolbar to view your downloaded file.

Click the downloads icon in the toolbar to view your downloaded file.

Your file has been downloaded, click here to view your file.

Your file has been downloaded, click here to view your file.

Your file has been downloaded, check your file in downloads folder.

Your file has been downloaded, check your file in downloads folder.

  • Data Subject Request Form
  • Preference Center Login
  • Privacy Policy
  • Cookie Policy / DNT
沪ICP备08025378号
© 2023 GlobalSign. All Rights Reserved.
Get a GlobalSign Site Seal SSL
Ernst and Young CertifyPoint eIDAS Compliance Certificate ISO ISO CSM ISO PM

Applying your settings...

GlobalSign Website in other countries/regions

EMEA & Americas
  • EN / United States
  • EN / United Kingdom
  • EN / Europe
  • EN / Scandinavia
  • DE / Deutschland
  • DE / Europa
  • FR / France
  • FR / Belgium
  • NL / Nederland
  • NL / Belgium
  • ES / América Latina
  • ES / España
  • RU / Россия
  • PT / Brasil
  • EN / United Arab Emirates
APAC
  • 日本語 / 日本
  • 中文 / 中华人民共和国
  • EN / Hong Kong
  • EN / India
  • EN / Singapore
  • EN / Australia & New Zealand
  • EN / Philippines
  • ภาษาไทย
Preferred Partners
  • Find a Partner
  • Become a Partner
  • Contact Us