Featured Contributor
Ed Giaquinto
CIO at Sectigo
As CIO, Ed Giaquinto oversees IT and support, leading initiatives around change control, onboarding, proof of concept (POC), customer communications, service, and innovation in operational practices.

Ed assumed the role in February 2019 following his role as Sectigo’s VP of Information Technology, where he led strategic planning and IT process development gleaned from 30 years in the IT industry.
A dynamic and transformational executive team member with significant experience working for top-tier firms in a wide range of industries including pharmaceutical, retail, and Internet security. Demonstrated track record of strategic planning, process development and improvement, and budget management. Skilled with people, systems and processes to quickly analyze, organize, and deliver innovative solutions to meet business requirements, and improve productivity and efficiency. Adept at defining and executing multi-year strategic plans in support of business and financial objectives.
Recent Posts from Ed Giaquinto
-
Learn More
The 3 Key Benefits of Credential Vaults
A Blog Post from Sectigo
Blog Posts Mar 24, 2022Enterprises today increasingly rely on automated processes and systems, however the way this automation manifests itself is different for each organization. For example, automated DevOps container environments help to decrease the time to market for development. Connected IoT devices continuously optimize controls for everything within a business from an assembly line to the air conditioning, and automated workflows keep many aspects of operations running smoothly. The fact is, all departments stand to benefit from streamlined operations through the growing number of Robotic Process Automation (RPA) initiatives.
-
Blog Posts Mar 12, 2021
Small Biz Web Security Technologies with Big Impact
Small and medium-size businesses are often too swamped or resource-strapped to tackle website security, putting their organizations at risk of cybersecurity attacks. However, lack of attention (or knowledge) does not equate to a lack of importance. Website security is critical, regardless of your business’s size.
-
Blog Posts Oct 07, 2020
Tips to Remember During Cybersecurity Awareness Month
October is upon us, and that means the beginning of another Cybersecurity Awareness Month. To say that 2020 has been an interesting year would be a vast understatement, and cybersecurity professionals have had to face down new and unexpected challenges like the widespread shift to remote work amid the COVID-19 pandemic.
-
Blog Posts Apr 08, 2020
Top Tips to Prevent “Zoom Bombing”
I recently compiled useful tips published by the FBI, Zoom, and other authoritative sources, to help our internal team prevent unwanted Zoom visitors during calls during this new era of widespread videoconferencing.
-
Blog Posts Nov 05, 2019
Social Engineering: Friend or Foe?
In a social engineering attack, a bad actor uses human interaction (social skills) to acquire information about a company and/or its computer systems. Attackers often seem unassuming and respectable, often claiming to be a new employee, a service technician, or a member of the service-providing company and may even offer credentials to support that identity.
-
Blog Posts Oct 24, 2019
Proceed with Caution: Tips for Avoiding Email Phishing Scams
More than 90% of data breaches start with a phishing attack. Being able to spot phishing scams starts with knowing what motivates fraudsters. Here are the most common tactics used in email phishing and how to avoid becoming a victim.
-
Blog Posts May 15, 2019
Sectigo Sponsors a Certificate Transparency Log from Let’s Encrypt
Today we announced that Sectigo is sponsoring Let’s Encrypt’s new Certificate Transparency (CT) log "Oak." As Let’s Encrypt’s CT log sponsor, Sectigo makes it economically possible for Let’s Encrypt, a non-profit, to create and maintain a CT log capable of meeting high-volume SSL certificate logging needs.