
- April 08, 2021
- Sebastian Schulz
What Makes S/MIME Certificates Trustworthy?
In this blog, we discuss the (evolving) requirements for S/MIME and the attempt to create a standard.
In this blog, we discuss the (evolving) requirements for S/MIME and the attempt to create a standard.
IoT device manufacturers face many challenges in securely launching their products. First and foremost is the ability to provision device identities,…
A massive data breach at Facebook, reports of a "significant" attack at the European Commission, and the Golden Chicken ransomware gang is doing more…
This week we learned that Tesla was very fortunate as it was able to prevent a ransomware attack at one its factories. Ah, life in the age of cyber attacks.
As we’ve previously pointed out, every new technology is also a new opportunity for hackers. Brain-computer interfaces (BCIs) offer a new way for humans to interact with technology, but they also…
We’re excited to reintroduce the GlobalSign IoT Partner Program, celebrating our existing partnerships and inviting new collaborators to join us in delivering outstanding solutions to IoT customers…
In this blog, we explain why organizations shouldn't take a manual approach to certificate lifecycle management with containers and Kubernetes.
This week a well-known cybersecurity training company was hit by a data breach due to a phishing attack, making it clear that even the best of organizations can be no match for bad actors.
The terms Electronic Signatures and Digital Signatures are frequently used interchangeably yet there are some key differences and specific reasons for why you might use one over the other. Let’s jump…
In today’s blog, we’ll cover the European Telecommunications Standards Institute’s (ETSI) new cybersecurity standard for Internet of Things devices, ETSI EN 303 645.
In this week's cybersecurity news, observers are dissecting what happened at Garmin, which many sites are reporting paid hackers a fee in the millions. Apparently the criminals used a ransomware…
The healthcare industry is traditionally an industry well known for paper trails, but change is coming. Check out these 4 reasons why it pays to digitally sign healthcare documents.
The hack - which homed in on the company’s call center - enabled the attackers to encrypt up to 18,000 workstations using stolen admin credentials.
On the heels of the recent attack at Twitter, the tech world was abuzz about yet another high-profile cyber attack, this one at Garmin.
Spear phishing is on the rise as cyber criminals have begun impersonating Google to trick remote workers during the COVID-19 lockdown.
Check out these 9 best practices to improve the security of DevOps, which remains the largest single remaining barrier to continuous delivery.
In this article, we'll try and strip back the hype, and look at the actual capabilities of quantum computing.
This week in cybersecurity news, the Twitter hack is still at the top of everyone's minds. As it turns out, Twitter has not been using end-to-end encryption for direct messages.