-
Learn More
Cybersecurity basics: passwords, MFA, phishing & software updates
Blog Post from Sectigo
Blog Post Oct 04, 2024Despite years of awareness, basic cybersecurity practices like strong passwords, MFA, and phishing alerts are still essential in our fast-paced world.
-
Listen Now
EPISODE 342
Broadcast Date:
November 17, 202311 minutes
Podcast Nov 17, 2023Root Causes 342: Don't Change Your Password for Two Years
The CA/Browser Forum rules stipulate how often forced password changes for CA employees are to occur. They set a MINIMUM time. Join us to learn why.
-
Listen Now
EPISODE 332
Broadcast Date:
September 14, 202311 minutes
Podcast Sep 14, 2023Root Causes 332: Acoustic AI-based Key Logging Attack
An AI model that can interpret keystrokes based on the sound of keyboard use over a phone or video call and steal passwords.
-
Download Now
Certificate Based Authentication
Whitepaper from Sectigo
Whitepaper Oct 11, 2022Certificate-Based Authentication (CBA), which can replace the need for passwords across the enterprise.
-
Watch Now
45 minutes
Webinar Jan 20, 202215 Security Fallacies We Still Face in 2022
A VPN is not a security tool! It's in the name. This is just one of the many security misconceptions that people still continue to believe in 2022. There is a lot of misinformation surrounding information security and it only makes our jobs harder when protecting sensitive data. In this webinar, Sectigo’s Jason Soroko and Greg Mooney discuss the top security fallacies and some tips on ways to avoid them.
-
Learn More
Celebrate World Password Day by Exploring Modern Alternatives Like PKI
Blog Post from Sectigo
Blog Post May 06, 2021Although the world is slowly going back to normal, remote work is still prevalent and cybercriminals are a huge risk to organizations now more than ever. World Password Day, is celebrated annually on May 6th and serves as a reminder of the importance password security brings to organizations across the globe. Use this day to focus on what password practices your organization is utilizing and to explore possible alternatives such as PKI.