Redirecting you to

Resource Library

Looking for something? Search or browse our extensive library of resources

Start typing to search tags.

Advanced Filters

Filter by Tag

Clear Selection

Filter by Date Range

  • Register Now

    REGISTER

    A live webinar hosted by Sectigo.

    60 minutes

    Webinar Upcoming

    How mature is your Certificate Lifecycle Management?

    The surge in certificate usage has reached unprecedented levels, with industry standards for certificate lifespans progressively shrinking.

  • Learn More

    The risks & impacts of SSL certificate outages

    Blog Post from Sectigo

    Blog Post Sep 17, 2024

    Expired SSL certificates risk security, downtime, lost trust, and financial loss; strong renewal processes are essential.

  • Watch Now

    3 minutes

    Product Video Sep 17, 2024

    How-To SCM: Order SSL certificates with Azure Key Vault

    In this video, we will provide you with a comprehensive explanation of the process for ordering SSL/TLS certificates with Azure Key Vault.

  • Learn More

    RansomHub releases 487GB of Kawasaki Motors Europe data

    News Article from Sectigo

    News Article Sep 16, 2024

    RansomHub over the weekend reportedly released 487 gigabytes of Kawasaki Motors Europe (KME) data to the public internet in a case that has U.S. security pros concerned because of RansomHub’s prolific activity of late worldwide.

  • Learn More

    Progress Software patches 10.0 vulnerability in LoadMaster releases

    News Article from Sectigo

    News Article Sep 13, 2024

    Progress Software patched a critical 10.0 vulnerability that affects all LoadMaster releases, as well as the LoadMaster Multi-Tenant hypervisor.

  • Learn More

    Sectigo’s CLM maturity model for digital certificate management

    Blog Post from Sectigo

    Blog Post Sep 13, 2024

    Automated CLM simplifies SSL/TLS management. Sectigo's CLM maturity model helps businesses automate and secure digital certificates effectively.

  • Listen Now
    Root Causes - A PKI & Security Podcast

    EPISODE 420

    Broadcast Date:
    September 13, 2024

    13 minutes

    Podcast Sep 13, 2024

    Root Causes 420: New Side Channel Attack Against YubiKeys

    EUCLEAK, a newly revealed side-channel vulnerability, can clone the contents of a YubiKey. We talk about the attack and its significance.

  • Learn More

    Progress Software issues fix for maximum severity vulnerability

    News Article from Sectigo

    News Article Sep 12, 2024

    Progress Software issued an emergency fix to deal with a vulnerability impacting its its LoadMaster and LoadMaster Multi-Tenant (MT) Hypervisor products. This issue, called CVE-2024-7591, is considered a maximum severity vulnerability. The vulnerability is an improper input validation issue, which could allow unauthenticated, remote attackers to gain access to LoadMaster’s management interface.

  • Learn More

    Sectigo launches pkimetal to simplify certificate linting for certificate authorities

    Press Release from Sectigo

    Press Release Sep 11, 2024

    SCOTTSDALE, Ariz., — September 11, 2024 — Sectigo, a global leader in Certificate Lifecycle Management (CLM) and WebPKI solutions, proudly announces the release of pkimetal, a groundbreaking project designed to revolutionize the deployment of certificate linting for Certificate Authorities (CAs).

  • Learn More

    AI-Powered Deepfake Scams Wreak Havoc on Businesses

    News Article from Sectigo

    News Article Sep 10, 2024

    More than half (53%) of businesses in the U.S. and UK have been targeted by financial scams using deepfake technology, with 43% of those companies falling victim, according to a Medius survey of 1,533 finance professionals.

  • Learn More

    Y2K Redux: Echoes of the past in today's cybersecurity era

    News Article from Sectigo

    News Article Sep 10, 2024

    As the clock struck midnight on December 31, 1999, the world held its breath fearing the Y2K crisis, also known as the millennium bug. This potential catastrophe threatened global chaos. Yet, as the new millennium dawned, disaster was averted not due to the non-existence of the threat, but because of meticulous planning and diligent preparation by forward-thinking business leaders who framed it as a risk issue rather than merely a technological glitch.

  • Learn More

    Crime gangs can triumph with AI

    News Article from Sectigo

    News Article Sep 10, 2024

    In the past few years, artificial intelligence technology has crossed a threshold with the capability to make people look and sound like other people. A 'deepfake' is fabricated hyper-realistic digital media, including video, image and audio content. Not only has this technology created confusion, scepticism and the spread of misinformation, deepfakes also pose a threat to privacy and security.