-
Learn More
Post-quantum cryptography will enter boardroom discussions
A Blog Post from Sectigo
Blog Post Nov 30, 2023No longer just a buzzword, crypto-agility in light of the quantum threat will become a key focus for the C-suite next year.
-
Learn More
TLS/SSL Handshake Errors & How to Fix Them
A Blog Post from Sectigo
Blog Post Nov 23, 2023Transport Layer Security (TLS), also called Secure Sockets Layer (SSL), is a security protocol that encrypts data exchanged between two points on the internet (e.g., a web server and a browser). It also authenticates a website's identity.
-
Learn More
Cybersecurity Tips to Help CISOs Prepare for Holiday Time Off
A Blog Post from Sectigo
Blog Post Nov 22, 2023Organizations experience 30% more ransomware attacks during the holiday season, with a 70% average increase in attempted ransomware attacks in November and December compared with January and February. Many factors converge to make defending our infrastructures more challenging, such as increased online transactions and a shortage of IT resources as employees go on vacations.
-
Learn More
Why Are Code Signing Certificates Shipped on Tokens?
A Blog Post from Sectigo
Blog Post Nov 22, 2023How can a user be sure software has not been tampered with during the distribution process? We need a verification process Code Signing enhances trust and prevents the spread of malware and are proven to be reliable and sure over decades of widespread use. However, did you know about the recent standards update that added a hardware token requirement? Here's how a token can help you improve security.
-
Learn More
How Can I Manage Certificates From Multiple Public CAs?
A Blog Post from Sectigo
Blog Post Nov 20, 2023Should you purchase all your digital certificates from one Certificate Authority (CA) or get them from different ones?
Let's explore the pros and cons of using multiple CAs and how a robust, CA-agnostic Certificate Lifecycle Management (CLM) platform allows you to enjoy the benefits that several different CAs provide.
-
Learn More
What Is a Credential Vault?
A Blog Post from Sectigo
Blog Post Nov 17, 2023Most organizations face increasingly complex IT environments with growing numbers of security credentials. This often hampers IT efficiency and poses increasing risks of intrusion and data breach. Plus, ensuring everything complies with the latest policy and compliance requirements is time-consuming and labor-intensive.
-
Learn More
The Significance of Vendor Consolidation
A Blog Post from Sectigo
Blog Post Nov 14, 2023Organizations worldwide are increasingly focusing on vendor consolidation as an essential strategy to harness the full potential of automation, digital certificates, and digital security. By streamlining vendor relationships, organizations can achieve enhanced efficiency, improved security, reduced complexity, and in some cases substantial cost savings. However, time constraints and switching costs can present large barriers to integrating platforms, and when consolidating businesses need to make sure there aren’t gaps in security coverage.
-
Learn More
Domain Control Validation (DCV) Methods & How to Choose
A Blog Post from Sectigo
Blog Post Nov 13, 2023Secure Sockets Layer/Transport Layer Security (SSL / TLS) certificates are the gold standard in securing online data exchange. But how can you be sure that the website you share your sensitive information with is indeed who they say they are?
-
Learn More
Top 8 Weaknesses in Multi-Factor Authentication (MFA)
A Blog Post from Sectigo
Blog Post Nov 10, 2023Multi-factor Authentication (MFA) is a security principle that requires multiple authentication factors before granting users access to a system. For example, a user may have to submit a username, a password, and a security code texted to their phone before they can connect to a web application.
-
Learn More
What Is Crypto-Agility and How to Achieve It
A Blog Post from Sectigo
Blog Post Nov 09, 2023Today's organizations must achieve crypto-agility, which enables them to switch out cryptographic components whenever necessary instead of being locked into a specific cryptographic method.
This article explores what crypto-agility entails, why it's important, how it supports cybersecurity, and how to achieve crypto-agility. Plus, we'll discuss where certificate agility fits in and how you can protect your organizations against threats from quantum computing, which may soon make current cryptographic components ineffective.
-
Learn More
Certificate Signing Request (CSR) Guide
A Blog Post from Sectigo
Blog Post Oct 12, 2023What is a certificate signing request (CSR)? Learn about the meaning of this request for SSL/TLS certificates and how to generate one on different platforms.
-
Learn More
The Difference Between “Secure” and “Safe” Is Bigger Than You Might Think
A Blog Post from Sectigo
Blog Post Oct 12, 2023Most of the time, the terms “secure” and “safe” can be used interchangeably. You’re never going to get hung up on whether a bank tells you’re your money is “secure” or “safe” within its vault. But when it comes to your personal information on the internet, understanding the distinction between those two words can mean the difference between effectively protecting yourself and having your identity compromised.