Darling Ingredients cut outages and streamlined certificate management with Sectigo’s automated, centralized platform for public and private CAs.
Resource Library
Certificate maximum term is shrinking. In this episode we examine exactly how short they could get.
In our ongoing series on AI in 1000 days, we describe the inevitable, complete distrust of voice printing as an authentication method, including why and what we think will happen.
Quantum computing is on the horizon, and 47-day certificates are an early warning. Frequent renewals boost crypto agility, preparing CIOs for a future where static cryptography won’t suffice.
We begin a new series about what we expect from AI in the next three years. In this episode we discuss AI emulating emotional intelligence and its benefits.
With the first key milestone just over 100 days ahead, IT teams are facing a new reality: manual certificate management is no longer sustainable.
Why SLED institutions must adopt certificate automation ahead of the 47-day SSL lifecycle era
SLED agencies must automate certificates before the 47-day SSL era to avoid outages, noncompliance, and rising cyber risk.
The Future of Digital Trust: Tim Callan on Certificates, Cryptography, and Identity | Ep 1138
In this episode of The Digital Executive, host Brian Thomas talks with Tim Callan, Sectigo’s Chief Experience Officer and a leading authority on SSL and PKI. With 20+ years shaping digital trust standards, Tim reveals how certificate and encryption infrastructure secures our connected world.
The PKI perfect storm: how to kill three birds with one stone (spoiler: the stone is automation)
47-day certs, post-quantum cryptography (PQC), and mutual TLS (mTLS) deadlines are colliding. Automation is the one stone that solves them all.
In this episode we discuss the value for enterprises in running mass revocation drills and compare the merits of tabletop exercises versus voluntary revocation events.
As AI models move from the cloud to edge devices, the risk of tampering grows. Unsigned language models can be manipulated, threatening integrity and trust. It’s time to apply code-signing principles to AI models because the machines are thinking, and we need to start signing them.
Online security is changing rapidly. Certificate lifespans are shrinking to just 47 days by 2029. Quantum computing will soon make current encryption obsolete. Organizations must automate their systems to manage these shifts.
We are joined by guests Pol Holzmer and Johannes Sedlmeir to describe their recent research that documents and organizes public arguments made about QWAC certificates. You can find this research at orbilu.uni.lu/handle/10993/66334.
The MOSH tool aids the use of SSH-secured sessions, especially across different systems. Jason unpacks the security of this system and how it uses encryption and shared secrets.
We have seen the first known instance of an AI tool discovering a zero-day vulnerability. This could have vast implications on vulnerability detection and bug bounty programs. We discuss the implications.
Chain of lure is an attack method used to circumvent restrictions and boundaries placed on AIs. Jason explains this attack and its implications.
In this episode we go over some of the reasons one might choose HQC over ML-KEM as a PQC key exchange algorithm for specific circumstances. And we discuss the future diversity of cryptography.
NIST recently selected a second Key Exchange Module (KEM) among the PQC algorithms, HQC. We explain this code-based algorithm.
Need help?
Need help making a purchase? Contact us today to get your certificate issued right away.

