Redirecting you to

Blog Posts

Expert commentary on the latest issues and trends in online trust, digital certificates, web security, IoT, and identity solutions by established leaders in digital security.

Subscribe
Start typing to search tags.

Advanced Filters

Filter by Tag

Clear Selection

Filter by Date Range

  • Learn More

    Post-quantum cryptography will enter boardroom discussions

    A Blog Post from Sectigo

    Blog Post Nov 30, 2023

    No longer just a buzzword, crypto-agility in light of the quantum threat will become a key focus for the C-suite next year.

  • Learn More

    TLS/SSL Handshake Errors & How to Fix Them

    A Blog Post from Sectigo

    Blog Post Nov 23, 2023

    Transport Layer Security (TLS), also called Secure Sockets Layer (SSL), is a security protocol that encrypts data exchanged between two points on the internet (e.g., a web server and a browser). It also authenticates a website's identity.

  • Learn More

    Cybersecurity Tips to Help CISOs Prepare for Holiday Time Off

    A Blog Post from Sectigo

    Blog Post Nov 22, 2023

    Organizations experience 30% more ransomware attacks during the holiday season, with a 70% average increase in attempted ransomware attacks in November and December compared with January and February. Many factors converge to make defending our infrastructures more challenging, such as increased online transactions and a shortage of IT resources as employees go on vacations.

  • Learn More

    Why Are Code Signing Certificates Shipped on Tokens?

    A Blog Post from Sectigo

    Blog Post Nov 22, 2023

    How can a user be sure software has not been tampered with during the distribution process? We need a verification process Code Signing enhances trust and prevents the spread of malware and are proven to be reliable and sure over decades of widespread use. However, did you know about the recent standards update that added a hardware token requirement? Here's how a token can help you improve security.

  • Learn More

    How Can I Manage Certificates From Multiple Public CAs?

    A Blog Post from Sectigo

    Blog Post Nov 20, 2023

    Should you purchase all your digital certificates from one Certificate Authority (CA) or get them from different ones?

    Let's explore the pros and cons of using multiple CAs and how a robust, CA-agnostic Certificate Lifecycle Management (CLM) platform allows you to enjoy the benefits that several different CAs provide.

  • Learn More

    What Is a Credential Vault?

    A Blog Post from Sectigo

    Blog Post Nov 17, 2023

    Most organizations face increasingly complex IT environments with growing numbers of security credentials. This often hampers IT efficiency and poses increasing risks of intrusion and data breach. Plus, ensuring everything complies with the latest policy and compliance requirements is time-consuming and labor-intensive.

  • Learn More

    The Significance of Vendor Consolidation

    A Blog Post from Sectigo

    Blog Post Nov 14, 2023

    Organizations worldwide are increasingly focusing on vendor consolidation as an essential strategy to harness the full potential of automation, digital certificates, and digital security. By streamlining vendor relationships, organizations can achieve enhanced efficiency, improved security, reduced complexity, and in some cases substantial cost savings. However, time constraints and switching costs can present large barriers to integrating platforms, and when consolidating businesses need to make sure there aren’t gaps in security coverage.

  • Learn More

    Domain Control Validation (DCV) Methods & How to Choose

    A Blog Post from Sectigo

    Blog Post Nov 13, 2023

    Secure Sockets Layer/Transport Layer Security (SSL / TLS) certificates are the gold standard in securing online data exchange. But how can you be sure that the website you share your sensitive information with is indeed who they say they are?

  • Learn More

    Top 8 Weaknesses in Multi-Factor Authentication (MFA)

    A Blog Post from Sectigo

    Blog Post Nov 10, 2023

    Multi-factor Authentication (MFA) is a security principle that requires multiple authentication factors before granting users access to a system. For example, a user may have to submit a username, a password, and a security code texted to their phone before they can connect to a web application.

  • Learn More

    What Is Crypto-Agility and How to Achieve It

    A Blog Post from Sectigo

    Blog Post Nov 09, 2023

    Today's organizations must achieve crypto-agility, which enables them to switch out cryptographic components whenever necessary instead of being locked into a specific cryptographic method. 

    This article explores what crypto-agility entails, why it's important, how it supports cybersecurity, and how to achieve crypto-agility. Plus, we'll discuss where certificate agility fits in and how you can protect your organizations against threats from quantum computing, which may soon make current cryptographic components ineffective.

  • Learn More

    Certificate Signing Request (CSR) Guide

    A Blog Post from Sectigo

    Blog Post Oct 12, 2023

    What is a certificate signing request (CSR)? Learn about the meaning of this request for SSL/TLS certificates and how to generate one on different platforms.

  • Learn More

    The Difference Between “Secure” and “Safe” Is Bigger Than You Might Think

    A Blog Post from Sectigo

    Blog Post Oct 12, 2023

    Most of the time, the terms “secure” and “safe” can be used interchangeably. You’re never going to get hung up on whether a bank tells you’re your money is “secure” or “safe” within its vault. But when it comes to your personal information on the internet, understanding the distinction between those two words can mean the difference between effectively protecting yourself and having your identity compromised.