- May 02, 2025
- Debbie Hayes
SSL / TLS Certificates to Reduce From 398 Days to 47 Days – What’s Next?
SSL / TLS certificate lifespans are decreasing from 398 to 47 days by 2029, but what steps can you take now to get prepared?
SSL / TLS certificate lifespans are decreasing from 398 to 47 days by 2029, but what steps can you take now to get prepared?
With SSL / TLS certificate lifespans decreasing to 47 days by 2029, SAN Licensing offers a flexible future-ready alternative.
This blog looks at how Verified Mark Certificates provide organizations with email authenticity and security and improve trust in digital communications.
Artificial Intelligence (AI) has become a transformative force across various industries, revolutionizing the way we live and work. From improving…
From 1 September 2023, the new CA/B Forum Baseline Requirements come into effect, are you ready? Read on to learn more
PKI For Businesses: With the progressive evolution of the internet, ensuring the security of businesses' online presence has become an increasingly…
Artificial Intelligence (AI) has become a transformative force across various industries, revolutionizing the way we live and work. From improving healthcare to optimizing transportation, AI's capabilities are awe-inspiring. However, amid the advancements, it is crucial to recognize and comprehend the potential dangers that accompany this powerful technology. This blog sheds light on the importance of understanding AI risks and explores six potential dangers of artificial intelligence.
The Basic Requirements (BR) describe the minimum allowed settings and configurations for S/MIME. Read this blog for more information.
PKI For Businesses: With the progressive evolution of the internet, ensuring the security of businesses' online presence has become an increasingly formidable task, owing to the relentless advancements in cyber threats. While the battle against cyber threats remains ongoing, the risk can be significantly mitigated by incorporating Public Key Infrastructure (PKI) into your business strategy. Now before we dive deeper, let us try to understand the meaning of a Public Key Infrastructure (PKI)?
Digital certificate requirements are complex, and manual methods are no longer sustainable. GlobalSign's LifeCycleX was built with this reality in mind.
SSL / TLS certificate lifespans are decreasing from 398 to 47 days by 2029, but what steps can you take now to get prepared?
This blog looks at how Verified Mark Certificates provide organizations with email authenticity and security and improve trust in digital communications.
Whether you work in commerce, infrastructure, healthcare, or finance, complying with your industry’s unique set of security regulations is no doubt a chief operational objective. ..
The Department of Homeland Security opens the National Risk Management Center which aim to identify and prevent cyber-incidents that could have a catastrophic impact to public health and safety, the…
What is an intermediate or subordinate CA? We take a look at this concept by looking at certificate hierarchy. You will also find out why companies set-up their own intermediate or subordinate CA.
A denial-of-service (DoS) attack occurs when a system or machine maliciously gets flooded with traffic or information that makes it crash or be otherwise inaccessible to users...
According to industry estimates, more than 70 percent of WordPress installations are vulnerable to hacker and malware attacks. Here's some plugins you won't regret taking a look at!
Cybersecurity is something that every business needs to take seriously. With record numbers of hacking attacks affecting businesses of all sizes, it is important that every company is aware of the…
The Internet of Things (IoT) continues to emerge as the next wave of industry revolution and many industries are “hopping along” for “the ride”. The healthcare industry is no exception, as…
Even after pouring billions of dollars into their GDPR-compliance efforts, some big businesses have already been slammed with lawsuits claiming these companies’ practices aren’t up to snuff with the…
Those that social engineer are hackers, conducting phishing-like scams with the objective of gaining enough personal information through confidence-instilling questions and exchanges.
We need to know who we’re interacting with online – who electronically signed that document, who really sent that email, who’s behind this site I’m about to log into.
In addition to instant messaging and augmented reality, we’re also now beginning to see vehicles (especially in the luxury market) offering features like self-parking, adaptive cruise control,…
Since its introduction nearly 10 years ago, blockchain technology has taken the world by storm. We'll look at ways it can improve eCommerce.
Two weeks ago, Google did what they said they would and flagged HTTP websites as “Not Secure” with the release of Chrome 68. A lot of websites already wised up and upgraded their websites to the safer…
Countries from the APAC Region have been making great efforts to improve their cybersecurity. From forging meaningful partnerships to improving disaster tactics, these recent developments will make…
Using a free VPN? Nothing is free these days and John Mason is here to tell you exactly how these free VPNs use your data to make money. You might not like what you find out about your privacy.