-
Learn More
How Let's Encrypt Runs CT Logs
Blog Post from Sectigo
Blog Post Nov 25, 2019[This guest post originally ran on Let’s Encrypt’s blog on Nov 20, 2019.] Let’s Encrypt launched a Certificate Transparency (CT) log this past spring. We’re excited to share how we built it in hopes that others can learn from what we did. . . Sectigo and Amazon Web Services generously provided support to cover a significant portion of the cost of running our CT log.
-
Listen Now
EPISODE 53
Broadcast Date:
November 25, 201919 minutes
Podcast Nov 25, 2019Root Causes 53: 2019 Lookback - Governments Try to Control PKI
It's been an eventful year for PKI. In this episode our hosts discuss how governments sought to control encryption, certificates, and public trust in 2019.
-
Listen Now
EPISODE 52
Broadcast Date:
November 22, 201924 minutes
Podcast Nov 22, 2019Root Causes 52: New TLS Certificate Incident Research
Indiana University Bloomington recently published public SSL research, including methodology, incident types and causes, and rogue certificates.
-
Blog Post Nov 20, 2019
Australia's IoT Cybersecurity Guidelines for Embedded Device Security
Australia has joined the ever-swelling ranks of government and industry organizations developing guidelines or enacting regulations regarding IoT device security. On Nov. 11, 2019, the country published their “Draft Code of Practice: Securing the Internet of Things for Consumers,” which outlines 13 security practices intended to apply to all IoT devices available in Australia.
-
Listen Now
EPISODE 51
Broadcast Date:
November 19, 201930 minutes
Podcast Nov 19, 2019Root Causes 51: Blockchain vs PKI
Join us as we explain the details of how blockchain and PKI work, similarities and differences between them, and what use cases are appropriate for each.
-
Download Now
Sectigo IoT Use Case: Private PKI for Manufacturing
Datasheet from Sectigo
Datasheet Nov 18, 2019To enable secure authentication and prevent counterfeiting, OEMs and manufacturers add certificates to their IoT devices and chips at the assembly line.
-
Learn More
Why End-to-End Encryption Is Here to Stay
News Article from Sectigo
News Article Nov 18, 2019Recently, the U.S. has been exploring the idea of banning end-to-end encryption (E2EE). Sectigo CEO Bill Holtz explains in his latest Forbes Technology Council column why technologists must remain vigilant against the erosion of security and attempts to weaken encryption—and why E2EE is not going anywhere.
-
Watch Now
2 minutes
Product Video Nov 14, 2019Augment Microsoft CA and Secure Non-Windows Devices and Applications
Sectigo Certificate Manager can augment Microsoft CA to secure non-Windows applications, mobile devices, web servers, IoT, DevOps, SSH, and more.
-
Press Release Nov 13, 2019
First Year Marks Innovation, Awards, Enterprise Revenue Nearly Doubled
Sectigo announced impressive accomplishments from its first year since rebranding in November 2018, highlighted by significant YoY enterprise sales growth, industry-first innovations, IoT partnerships, and awards.
-
Download Now
Sectigo PKI Enterprise Use Case: Wi-Fi
Datasheet from Sectigo
Datasheet Nov 12, 2019PKI-based authentication for Wi-Fi enables password-free user access and helps ensure the highest standards of security and identity.
-
Download Now
Sectigo PKI Enterprise Use Case: Web Servers
Datasheet from Sectigo
Datasheet Nov 12, 2019Automated deployment, renewal, discovery, and lifecycle management of SSL / TLS certificates including reporting with a single pane of glass.
-
Download Now
Sectigo PKI Enterprise Use Case: VPN
Datasheet from Sectigo
Datasheet Nov 12, 2019Replacing multi-factor authentication for VPN access with certificate-based authentication improves the user experience and helps ensure security.