Tim Callan, the Chief Compliance Officer at Sectigo, wrote that the incident shows up the risks inherent in traditional credential systems.
Resource Library
Cybersecurity policies at Uber were called into question today after the ride-hailing app was forced to shut down its staff messaging service following a security breach on its computer network.
Cybersecurity policies at Uber were called into question today after the ride-hailing app was forced to shut down its staff messaging service following a security breach on its computer network.
The hacker claimed to have been able to access to the company’s email and cloud storage systems, and said the firm had weak security standards.
Miners shutting shop, centralisation concerns, downside risks… A lot is on the line for Ethereum.
Ethereum began the slow switch to proof-of-stake in December 2020, a move set to be complete on Wednesday.
Small and medium-sized businesses are especially vulnerable to the latest evolution of security threats.
The Metaverse and Web3 Could Fail Without Identity-First Security Principles: Here's How IT Leaders Can Take Action
Modern-day IT environments should focus on establishing Digital Trust for the massive amounts (and growing) of human and machine identities.
Our personal and identity data is collected by practically every service or product we engage with and spread around the far corners of the online world.
As an increasing amount of personal and critical business information is available online, stronger provisions are required to ensure the sensitive data is correctly safeguarded.
For nearly 50 years, public key infrastructure (PKI) has formed the secure cryptographic foundation for the world’s digital systems. But quantum computing may break down this defence.
Need help?
Need help making a purchase? Contact us today to get your certificate issued right away.

