Certificate automation is poised to mark another significant milestone - transforming and redefining businesses and sectors across all scales.
Resource Library
Showing 793 to 810 of 2,376 resources
2024 prediction: post-quantum cryptography will become the next big boardroom discussion
No longer just a buzzword, crypto-agility in light of the quantum threat will become a key focus for the C-suite next year.
NIST continues the search for PQC algorithms, especially those using non-Lattice schemes. We explain the PQC "onramp" and what we should expect.
Part of the UK strategy is to deploy an advanced quantum network at by 2035 with benefits for healthcare, telecoms, transport and more. However, for Tim Callan, chief experience officer at Sectigo, Hunt’s 10-year quantum plan falls short when it…
A controversial aspect of the upcoming eIDAS 2.0 standard is that it limits browsers' ability to determine their own trusted roots. We explain.
Organizations experience 30% more ransomware attacks during the holiday season, with a 70% average increase in attempted ransomware attacks in November and December compared with January and February. Many factors converge to make defending our…
How can a user be sure software has
not been tampered with during the distribution process? We need a verification
process Code Signing enhances trust and prevents the spread of malware and are
proven to be reliable and sure over decades of…
Tim Callan, Chief Experience Officer at security firm Sectigo, told DailyMail.com, 'With the acceleration of deep fake technology, people will no longer be able to trust the authenticity of a digital record, whether a photo, video or voice recording.…
Nick France, CTO of Sectigo, says that this could have an impact on voice and face recognition employees currently use to authenticate themselves.
Should you purchase all your digital certificates from one Certificate Authority (CA) or get them from different ones?
Let's explore the pros and cons of using multiple CAs and how a robust, CA-agnostic Certificate Lifecycle Management (CLM) platform…
The CA/Browser Forum rules stipulate how often forced password changes for CA employees are to occur. They set a MINIMUM time. Join us to learn why.
Most organizations face increasingly
complex IT environments with growing numbers of security credentials. This
often hampers IT efficiency and poses increasing risks of intrusion and data
breach. Plus, ensuring everything complies with the latest…
Organizations worldwide are increasingly focusing on vendor consolidation as an essential strategy to harness the full potential of automation, digital certificates, and digital security. By streamlining vendor relationships, organizations can…
The practice of sending security questionnaires to technology vendors is exploding, and with it dysfunctional behavior is on the rise.
“In the next five years,” says France, “AI is only going to increase the sophistication of this kind of deepfake scams, making the technology more democratised, easier to perform and more accurate to the persona they are mimicking.”
Join our webinar to learn about the five pillars of certificate lifecycle management, building upon the foundations of visibility.
Join our webinar to learn more about the 2024 PKI buzzwords and trends!
Learn how Domain Control Validation (DCV) works, explore key validation methods, and find the right approach for securing your SSL/TLS certificate.
Need help?
Need help making a purchase? Contact us today to get your certificate issued right away.

