-
Learn More
Yes, It's Possible to Protect Home Doorbells and Cameras Against...
News Article from Sectigo
News Article Jan 13, 2020Ring doorbells and cameras have joined the ever-growing list of compromised IoT devices. According to reports, credentials to 3000 Ring accounts have been compromised, resulting in alarming attacks. While password reuse was a root cause of the most recent Ring breaches, this wasn’t just a user error.
-
Listen Now
EPISODE 61
Broadcast Date:
January 10, 202032 minutes
Podcast Jan 10, 2020Root Causes 61: Anatomy of a Cryptocurrency
In this episode we discuss the technology and ecosystem of cryptocurrencies, including blockchain and PKI.
-
Learn More
Sectigo Code Signing Authentication Evolves
Blog Post from Sectigo
Blog Post Jan 07, 2020Some Sectigo Code Signing certificate subscribers have opined recently that our Code Signing authentication now includes additional steps and requirements it did not have in previous years. This observation is accurate. Sectigo of recent has increased its process and requirements for obtaining Code Signing certificates.
-
Learn More
7 Crucial Questions About Quantum Computing and Cybersecurity
News Article from Sectigo
News Article Jan 06, 2020Quantum computers take advantage of the very nature of quantum physics to create an entirely new computing paradigm, unlike the traditional 0/1 gated computers we have been using since the 1960s. Sectigo's Alan Grau discusses the threat that Quantum Computing could have on cybersecurity and the viability of current hashing solutions.
-
Listen Now
EPISODE 60
Broadcast Date:
January 6, 202022 minutes
Podcast Jan 06, 2020Root Causes 60: Fundamentals of Blockchain
Blockchain has become a household word. But what is it, and how does it work? Join our hosts and guest Alan Grau as they explain how blockchain functions.
-
Download Now
Quantum PKI Toolkit Demo
Tech Document from Sectigo
Tech Document Jan 01, 2020The Sectigo Quantum Safe Certificate Toolkit is a demo/POC solution that allows enterprises and security professionals to evaluate quantum safe solutions.
-
Listen Now
EPISODE 59
Broadcast Date:
December 30, 201922 minutes
Podcast Dec 30, 2019Root Causes 59: What Is Certificate Transparency?
Certificate Transparency (CT) is important for SSL certificates. Learn what CT is and how it can teach us about SSL usage and help improve public trust.
-
Learn More
New Embedded Firewall to Address Automotive Systems
News Article from Sectigo
News Article Dec 28, 2019To better protect vehicles from cyberattacks, Sectigo, the world’s largest commercial Certificate Authority and a provider of purpose-built and automated PKI management solutions, released the Sectigo Embedded Firewall for Automotive.
-
Learn More
Embedded Firewall Protects ECUs from Cyberattacks
News Article from Sectigo
News Article Dec 19, 2019To speed adoption–and security–across the automotive supply chain, EDA company Mentor has integrated the Sectigo Embedded Firewall for Automotive with its popular AUTOSAR platform.
-
Blog Post Dec 18, 2019
Sectigo Executives Share 2020 Predictions
Turning attention to 2020, our leadership team has been working to identify predictions about quantum computing, automation, IoT security, and legislation.
-
Press Release Dec 18, 2019
Sectigo Releases Embedded Firewall to Protect Automotive Systems
Sectigo released the Sectigo Embedded Firewall for Automotive to better protect vehicles from cyberattacks. Mentor, a Siemens business, has integrated the Sectigo Embedded Firewall for Automotive with its popular AUTOSAR platform and a global tier-one automotive ECU supplier is among the early adopters the Sectigo-enabled AUTOSAR platform, indicating the urgency for embedded security.
-
Learn More
Keeping Medical Devices, Services, and Data, Safe from CyberAttacks
News Article from Sectigo
News Article Dec 18, 2019In the last few years, hospitals and medical facilities have been successfully targeted by cyber crooks looking to exploit or wreak havoc on the healthcare sector and its patients. Emboldened by the industry’s slow progress in adopting technologies that harden medical devices and data systems, criminals have upped their game.