-
Learn More
What Is Perfect Forward Secrecy? PFS Explained
A Blog Post from Sectigo
Blog Post Jan 17, 2022Perfect forward secrecy is a feature of SSL/TLS & an important part of the future of cybersecurity. Learn what this encryption system is & how it works.
-
Learn More
How Long Are Digital Certificates Valid?
A Blog Post from Sectigo
Blog Post Jan 14, 2022Learn about how the validity periods for digital certificates are determined and the benefits of digital certificates.
-
Listen Now
EPISODE 144
Broadcast Date:
January 26, 202113 minutes
Podcast Jan 26, 2021Root Causes 144: Whatever Happened to the Green Address Bar?
In recent years the EV SSL "green address bar" has shrunk and evenually disappeared. We walk you through how that came to be.
-
Listen Now
EPISODE 142
Broadcast Date:
January 18, 202112 minutes
Podcast Jan 18, 2021Root Causes 142: Removing Street and Postal Code from Public Certs
On March 1 Sectigo will remove street address and postal/zip code information from its public certificates of all types. Our hosts explain why.
-
Learn More
Sectigo Selected by Baidu to Provide SSL Services for All-New Baidu Trust SSL Certificates
A Press Release from Sectigo
Press Release Sep 22, 2020Sectigo announced that Baidu (NASDAQ: BIDU), a leading Chinese search engine with more than one billion daily page views, has chosen Sectigo to provide the back-end services for the company’s all-new Baidu Trust SSL Certificates. Baidu will offer Sectigo Domain Validated (DV), Organization Validated (OV), and Extended Validation (EV) certificates white-labeled under the Baidu Trust product line, greatly expanding Sectigo’s footprint in Asia.
-
Learn More
Don’t ‘Compromise’ Your Code Amid Malware Mayhem
A Blog Post from Sectigo
Blog Post Apr 21, 2020With EV Code Signing Certificates, the EV vetting process is mandated by the CA/Browser Forum, discouraging fraudsters from attempting to obtain them.
-
Listen Now
EPISODE 78
Broadcast Date:
March 26, 202015 minutes
Podcast Mar 26, 2020Root Causes 78: Extended Validation Certificates and the Dark Web
Learn about research indicating that criminal marketplaces feature services to obtain original Extended Validation (EV) SSL certificates.
-
Learn More
It's Time to Improve Website Identity Indicators, Not Remove Them
A News Article from Sectigo
News Article Oct 24, 2019Why Google and Mozilla are wrong about the benefits of Extended Validation certificates that aim to prevent fraud and protect user privacy.
-
Listen Now
EPISODE 39
Broadcast Date:
September 26, 201920 minutes
Podcast Sep 26, 2019Root Causes 39: New University Research on Phishing and Certificates
The majority of phishing sites now use SSL certificates to closely imitate the behavior of legitimate sites. Join our hosts as we dig into these findings.
-
Blog Post Sep 17, 2019
Status of Browsers and EV Indicators
Browsers are in a time of change for Extended Validation (EV) SSL indicators. Where once all popular browsers reliably displayed the company name in green to the left of the web address, now Chrome and Firefox have decided to remove the company name and require a click on the lock icon to see the certificate’s identity information.
-
Blog Post Aug 26, 2019
Mozilla Should Reconsider Removing the EV Green Address Bar
The week before last, very quickly and without advance warning, Mozilla announced that it would remove the Extended Validation SSL certificate indicator from its upcoming build 70. This announcement spawned a very lively debate that is still going on. Below is my response to the thread, explaining why I believe it to be ill- considered and detrimental to overall internet security. Jason Soroko and I also covered Mozilla's decision to remove the EV SSL indicator in our Root Causes PKI and security podcast series.
-
Listen Now
EPISODE 32
Broadcast Date:
August 15, 201925 minutes
Podcast Aug 15, 2019Root Causes 32: Why Do Browsers & Academics Say Differently About EV?
Research shows that sites with Extended Validation SSL certificates are less likely for malware and phishing. So why do browsers say it isn't effective?