Passwordless is a hot topic in identity. We explain credential form factors and offer a specific definition of passwordless.
Resource Library
Showing 1,495 to 1,512 of 2,493 resources
Digital identities are a critical component for securing the modern enterprise. Any entity that exists and communicates in the fabric of the enterprise needs to be authenticated and authorized to do so. Today, PKI certificates are used to establish…
Organizations must first understand the specific challenges that come with IoT security.
Sectigo is implementing an important change to its public-facing SSL certificate business called State-Locality Exclusivity. We explain in this episode.
Strategic Acquisitions and Stellar Growth in Enterprise Sales Set Foundation for a Record Year
Linters are a venerable coding tool has recently taken on new significant in the world of public certificates. Our hosts explain.
Digital certificates and other public/private key pairs permeate all corners of today’s enterprise. They enable the identity-based security approaches and encrypted machine-to-machine interactions that are essential to digital operations. The stakes…
Whitelisting and blocklisting are tried and true elements of the computer industry. We define them and discuss their pros and cons.
Microsoft has announced that its upcoming Windows 11 release will require TPM 2.0 support at a minimum. We discuss the implications of this announcement.
Public-key-infrastructure authentication is a safe and seamless tool for cyber protection.
Join Sectigo Senior Fellow Tim Callan and CTO of PKI Jason Soroko as they detail how Sectigo views the Zero Trust Network Architecture.
In Cybersecurity it is important to protect your identity – but what is that identity that people always talk about and why does it need protection?
Quantum computing doesn't have a start date and the fixes won't be as clean.
Business email compromise (BEC) remains a popular, skillfully crafted, and continually effective phishing attack vector for cybercriminals.
Discover the benefits of managing PKI in the clouds rather than On-Premise.
Non-fungible tokens uniquely identify digital assets using blockchain. We explain how NFTs work, and public assertion of ownership for digital files.
For years, the digital signature for processing confidential digital documents has been slowly emerging, but not yet commonplace. Over the past year, however, this form of signing has taken off, as more and more formal communication takes place…
Every day, quantum computing inches closer to becoming a reality. Recently, the Financial Times broke the news that Goldman Sachs believes quantum computing is a mere five years away from use in markets. However, while quantum computing undoubtedly…
Need assistance?
Contact our team for help with your purchase or issuing your certificate.