
- January 27, 2021
- Lancen Lachance
Protect IoT Devices and Supply Chains from Emerging Threats
Advanced architectural models for certificate protection are emerging that are designed to safeguard IoT device identities against supply chain…
Advanced architectural models for certificate protection are emerging that are designed to safeguard IoT device identities against supply chain…
Smishing text message scams are not new. But it’s important to remember: they are not going to disappear any time soon. All companies should include…
Miraculously, we’ve made it through one whole week without a large-scale ransomware attack. How refreshing! Naturally, there are a few smaller-scale…
To keep your work completely secured and easily accessible without compromising the privacy of yourself or your organization, follow these cybersecurity tips for remote working during COVID-19.
Learn how to remove unnecessary complexity and provide building blocks for developers to request certificates quickly via automation, while also addressing security concerns.
Need to comply with eIDAS, but not sure which type of signature you need? We explain the difference between advanced and qualified e-signatures to help you decide which is best for you.
Over the next several months and into the recovery, the channel will likely see a drift toward technologies and services that align with post-pandemic needs – but you need to act now to meet those…
In non-data breach news, Microsoft's issued an advisory warning organizations worldwide to deploy protections against a new strain of ransomware, PonyFinal.
The connectivity of the world is moving at break-neck speeds. The next evolutionary step in this process is already here.
One thing that might derail the ambitious goal of launching self-driving cars in the next decade is the need to address any potential cybersecurity vulnerabilities in autonomous technology.
Once again, data breaches were at the top of the news cycle this week. From new attacks to reports about them, there was quite a lot to digest.
The 25th of May, 2018, was a day marked out in everybody’s diary. It was the day GDPR officially became a law. Two years later, how has the world dealt with the "privacy apocalypse" and what can we…
Our VP of Product Management, Doug Beattie takes a closer look at the new CASC infographic: 'What Kind of SSl/TLS Certificate Do I Need?'
Introducing Atlas, the world’s most powerful cloud CA – a high throughput, fully ubiquitous, next-generation PKI platform that will carry your PKI on its shoulders and into the future.
As usual, hackers are up to old (and new) tricks, striking companies and organizations such as Magellan Health, Pitney Bowes and even an entertainment law firm that services top celebrities like Bruce…
HIPAA compliance is imposed on everyone dealing with a patient's Protected Health Information (PHI) - not only healthcare providers like doctors, nurses, and psychologists, but also insurance…
From Title Companies, Law Firms, Government, Healthcare, Life Sciences, Insurance, Wealth Management, Education, Technology, and much more, SIGNiX, a GlobalSign Partner, is the leader provider for…
Another working (from home) week is coming to an end, but sadly, cyber attacks on the healthcare sector are not abating. The most recent victim is Fresenius, Europe’s largest private hospital…