- May 02, 2025
- Debbie Hayes
SSL / TLS Certificates to Reduce From 398 Days to 47 Days – What’s Next?
SSL / TLS certificate lifespans are decreasing from 398 to 47 days by 2029, but what steps can you take now to get prepared?
SSL / TLS certificate lifespans are decreasing from 398 to 47 days by 2029, but what steps can you take now to get prepared?
With SSL / TLS certificate lifespans decreasing to 47 days by 2029, SAN Licensing offers a flexible future-ready alternative.
This blog looks at how Verified Mark Certificates provide organizations with email authenticity and security and improve trust in digital communications.
Artificial Intelligence (AI) has become a transformative force across various industries, revolutionizing the way we live and work. From improving…
From 1 September 2023, the new CA/B Forum Baseline Requirements come into effect, are you ready? Read on to learn more
PKI For Businesses: With the progressive evolution of the internet, ensuring the security of businesses' online presence has become an increasingly…
Artificial Intelligence (AI) has become a transformative force across various industries, revolutionizing the way we live and work. From improving healthcare to optimizing transportation, AI's capabilities are awe-inspiring. However, amid the advancements, it is crucial to recognize and comprehend the potential dangers that accompany this powerful technology. This blog sheds light on the importance of understanding AI risks and explores six potential dangers of artificial intelligence.
The Basic Requirements (BR) describe the minimum allowed settings and configurations for S/MIME. Read this blog for more information.
PKI For Businesses: With the progressive evolution of the internet, ensuring the security of businesses' online presence has become an increasingly formidable task, owing to the relentless advancements in cyber threats. While the battle against cyber threats remains ongoing, the risk can be significantly mitigated by incorporating Public Key Infrastructure (PKI) into your business strategy. Now before we dive deeper, let us try to understand the meaning of a Public Key Infrastructure (PKI)?
Digital certificate requirements are complex, and manual methods are no longer sustainable. GlobalSign's LifeCycleX was built with this reality in mind.
SSL / TLS certificate lifespans are decreasing from 398 to 47 days by 2029, but what steps can you take now to get prepared?
This blog looks at how Verified Mark Certificates provide organizations with email authenticity and security and improve trust in digital communications.
Wait, are there really two of those? Casual users rarely notice them, but HTTP (or, http://) and HTTPS (https://) are both options for the start of a URL, showcasing an important difference in all…
The Electronic Submissions Gateway (ESG) streamlines electronic regulatory submissions to the FDA, including adverse event reports and new drug applications.
When it comes to social networking, especially in this digital yet destructive era, Facebook comes to mind. The growing popularity of digital platforms suggests that it offers something we always…
The future of AI looks bright for SMBs. With more processes being taken over by Artificial Intelligence, Small and Medium Businesses will have more opportunity to compete in their industries.
After recent events, we don't want our resellers to be caught with their pants down. Here's some safe and secure tips to reselling SSL/TLS Certificates including best practice for key generation and…
What we can learn from the string of data breaches of past years is that cyberattacks affect everyone, from individuals to large organizations alike. Despite this, only 56% of companies in the entire…
After an interesting week in San Francisco for the RSA Security Conference, we look back at the common pain points and questions we got asked with a quick show of our basketball game!
Big data allows businesses to spot patterns in a way that improves organisational efficiency. In particular, big data is used by big tech companies (most famously Facebook, Apple, Amazon, Microsoft…
Making computer software and applications involves hours and hours of hard work. It takes so much effort to make a completely functional application that developers tend to forget how they should…
Common sense is not so common they say. When it comes to the Internet of Things, nothing is common these days. So here's some expert tips from Mark Dacanay on keeping your office secure from the IoT…
The cybersecurity community had a busy week. From the social media giant Facebook’s gaffe involving Cambridge Analytica to the recent data breaches of companies like Under Armour and Wendy’s, hackers…
What? Another blog about code signing? Due to a recent string of related hacking events, we thought it best to return to this topic and clear up some details that may have been unclear.
The need for trust and identity in electronic translations is on the rise! The customers want Trusted Digital Signatures; the service providers want to provide them…but how to do it? The answers could…
Bitcoin is one of the oldest and most widely used peer-to-peer payment systems today. There are however threats looming which may threaten the security of digital wallets.
In a world where the Internet of Things is only on its early stages, online security has never been this important