-
Download Now
IoT Identity Platform
Datasheet from Sectigo
Datasheet Nov 11, 2019The Sectigo IoT Identity Platform removes complexity associated with securing and authenticating connected devices, so you can protect your infrastructure.
-
Listen Now
EPISODE 50
Broadcast Date:
November 8, 201922 minutes
Podcast Nov 08, 2019Root Causes 50: Energy Infrastructure Cyber Attacks
Global energy infrastructure continues to find itself under cyber attack from Advanced Persistent Threats (APTs). Join us to learn more.
-
News Article Nov 06, 2019
Quantum Computing and IT - Tim Callan - ESW #160
In this Security Weekly video interview, Sectigo's Tim Callan discusses the expected outcomes of quantum computing and that cryptographic infrastructure will have to change in a fundamental way - with future encryption platforms needing to be resistant to attacks, not just from quantum computers but traditional computers as well.
-
Listen Now
EPISODE 49
Broadcast Date:
November 6, 201914 minutes
Podcast Nov 06, 2019Root Causes 49: California Consumer Privacy Act
Join us as we discuss The California Consumer Privacy Act (CCPA), what protections it provides, and what businesses must do to comply.
-
Blog Post Nov 05, 2019
Social Engineering: Friend or Foe?
In a social engineering attack, a bad actor uses human interaction (social skills) to acquire information about a company and/or its computer systems. Attackers often seem unassuming and respectable, often claiming to be a new employee, a service technician, or a member of the service-providing company and may even offer credentials to support that identity.
-
Learn More
Five Things I Wish Someone Told Me Before I Became a CEO of Sectigo
News Article from Sectigo
News Article Nov 04, 2019Editor Carly Martinetti interviews Bill Holtz, the CEO at Sectigo, which is driving innovation in digital identity and cybersecurity, including automation, IoT and DevOps, for today’s enterprises
-
Blog Post Oct 31, 2019
One Year In, Sectigo Stands Tall
As Sectigo turns one, the company stands proud of its innovations, growth, thought leadership, transparency, and commitment to customer success.
-
Listen Now
EPISODE 48
Broadcast Date:
October 31, 201916 minutes
Podcast Oct 31, 2019Root Causes 48: Weaknesses in MFA Authentication
Recent FBI warnings caution of attacks that circumvent Multi-Factor Authentication (MFA). We describe contemporary attacks and how to defend against them.
-
Learn More
Texas A&M System Deploys New Tech to Combat Ransomware
News Article from Sectigo
News Article Oct 29, 2019The Texas A&M University System has become an early adopter of a new ransomware solution from Sectigo, which recently partnered with cryptographic operating system developer SPYRUS to create an automated digital identity product that will help ensure the confidentiality, integrity and availability of university data.
-
Listen Now
EPISODE 47
Broadcast Date:
October 25, 201918 minutes
Podcast Oct 25, 2019Root Causes 47: Quantum Resistant Cryptography for IoT
Our hosts explore the specific requirements and challenges for quantum resistant cryptography for IoT networks and connected devices.
-
Blog Post Oct 24, 2019
Proceed with Caution: Tips for Avoiding Email Phishing Scams
More than 90% of data breaches start with a phishing attack. Being able to spot phishing scams starts with knowing what motivates fraudsters. Here are the most common tactics used in email phishing and how to avoid becoming a victim.
-
Learn More
It's Time to Improve Website Identity Indicators, Not Remove Them
News Article from Sectigo
News Article Oct 24, 2019Why Google and Mozilla are wrong about the benefits of Extended Validation certificates that aim to prevent fraud and protect user privacy.