- November 22, 2023
- Sarah Topping
DevOps Teams Need to Reprioritize Security - Here’s How
DevOps teams can no longer treat security as an afterthought, but reprioritizing is a huge task. Learn the best practices for prioritizing security.
DevOps teams can no longer treat security as an afterthought, but reprioritizing is a huge task. Learn the best practices for prioritizing security.
Let’s take a look at some of the key reasons why IT teams should implement automation within their organization.
In this article, we look at how digital identity verification plays a key role in the eIDAS 2.0 regulation.
Tens of thousands of dollars could be saved if governments adopted better identity and access management (IAM) solutions. Petteri Ihalainen, IAM product marketing manager at GlobalSign, looks at an…
Switching to a new Certificate Authority (CA) is not nearly as difficult as your incumbent CA may suggest. Allow us to shed some light on a few industry myths.
With the rise of the Internet of Things (IoT) many things and devices are in danger of, or are already being part of so called thingbots – a botnet that incorporates independent connected objects.
With the New Year just around the corner, we’d like to share our security predictions for 2016. These four topics will be at the forefront for security professionals in the coming year.
Nearly 2/3 of businesses admit to having lost customers within the last 2 years because they have failed to secure their website with the right SSL certificates.
One reason why your website isn't performing to the level you hoped for could be limited website security. 85% of online shoppers say they abandon the shopping basket, if they feel that their data…
Connected devices, Internet of Things, Internet of Everything are all coming. One way or another our every day utilities and devices we use will be connected to the Internet for one reason or another.…
Identity authentication is the most fundamental qualification for all of the things connecting to the Internet. Read the blog to learn more about connecting to IoT securely.
With a wide variety of approaches out there for how to identify devices, and also how devices authenticate into services, this blog explains how to build a secure IoT ecosystem from the Top Down. Read…
Identity and Access Management (IAM) can help in the ecommerce conversion process. Using an Identity Provider with multiple supported authentication methods allows visitor to choose their preferred…
With the release of Chrome 46, the Chrome security team has announced a change in how the Chrome browser will display sites with mixed content. HTTPS sites with mixed content will now appear to…
Visitors to sites protected by SSL expect (and deserve) security and protection. When a site doesn’t fully protect or secure all content, a browser will display a “mixed-content” warning. Mixed…
At GlobalSign we’re all about promoting security and making it as easy and accessible as possible for our customers. This is something that the founders of Security Serious week also believe in and…
We’re pleased to announce that GlobalSign Extended Validation (EV) Code Signing Certificates can now be used to sign kernel-based modules in the Windows Hardware Developer Center Dashboard Portal.
A collaborative security group has announced successful "Freestart Collisions" on SHA-1 (https://sites.google.com/site/itstheshappening/). While this type of collision doesn't directly lead to full…