Redirecting you to

Security Terminology

Easily understandable explanations of common industry terms.

  • Learn More

    UK bans default guessable passwords in new cybersecurity rules

    A News Article from Sectigo

    News Article Apr 30, 2024

    These UK rules ban manufacturers from having weak, easily guessable default passwords such as ‘admin’ or ‘12345’, but one expert believes these new rules don’t go far enough.

  • Learn More

    Does the UK’s new smart device security law go far enough to prevent cyberattacks?

    A News Article from Sectigo

    News Article Apr 30, 2024

    Manufacturers will now have to follow tougher rules to sell smart devices in the UK after, what some consider, a long overdue law came into effect at the end of April.

  • Learn More

    Chrome users report broken connections after Chrome 124 release

    A News Article from Sectigo

    News Article Apr 30, 2024

    Google Chrome users have been reporting having trouble connecting to websites, servers, and firewalls after Chrome 124 was released last week with quantum-resistant X25519Kyber768 encryption.

  • Learn More

    What is certificate revocation & when should an SSL cert be revoked?

    A Blog Post from Sectigo

    Blog Post Apr 29, 2024

    Digital certificates drive security. Lifecycle management, including revocation, prevents vulnerabilities. Understand its purpose and importance.

  • Learn More

    UK lays down fresh legislation banning crummy default device passwords

    A News Article from Sectigo

    News Article Apr 29, 2024

    Smart device manufacturers will have to play by new rules in the UK as of today, with laws coming into force to make it more difficult for cybercriminals to break into hardware such as phones and tablets.

  • Download Now

    Sectigo Certificate Manager Datasheet

    A Datasheet from Sectigo

    Datasheet Apr 29, 2024

    Sectigo Certificate Manager gives businesses complete visibility and lifecycle control over any certificate in their environment, helping them reduce risk.

  • Learn More

    Fears over scam calls and emails as cyber crime epidemic sweeps across UK

    A News Article from Sectigo

    News Article Apr 29, 2024

    TECH giant BT is blocking a staggering 32 million fake emails from arriving in people’s accounts every day as the cyber fraud scourge spreads.

  • Listen Now
    Root Causes - A PKI & Security Podcast

    EPISODE 382

    Broadcast Date:
    April 29, 2024

    12 minutes

    Podcast Apr 29, 2024

    Root Causes 382: Mobile Phone Malware Steals Faces for Access

    New malware photographs users' faces to defeat authentication mechanisms. Biometrics are not "secrets."

  • Learn More

    Google yet again delays killing third-party cookies in Chrome. Here's what you need to know

    A News Article from Sectigo

    News Article Apr 26, 2024

    Chrome users waiting for Google to kill third-party cookies now have to wait even longer. In a Tuesday news update, the company revealed that its plan to start blocking third-party cookies by default won't kick off until early next year, at the earliest.

  • Learn More

    Google Patches Critical Chrome Vulnerability and Additional Flaws

    A News Article from Sectigo

    News Article Apr 26, 2024

    Google addressed a critical vulnerability (CVE-2024-4058) in its Chrome web browser on Wednesday, April 24th, 2024. This flaw resides within the ANGLE graphics layer engine and carries a “critical” severity rating, indicating its potential for severe exploitation.

  • Listen Now
    Root Causes - A PKI & Security Podcast

    EPISODE 381

    Broadcast Date:
    April 26, 2024

    7 minutes

    Podcast Apr 26, 2024

    Root Causes 381: Apple Chip Sideloading Attack Leaks Encryption Keys

    A newly revealed side channel attack enables theft of private keys from M-series Apple chips. We explain.

  • Learn More

    NVD delays highlight vulnerability management woes: Put malware first

    A News Article from Sectigo

    News Article Apr 24, 2024

    A decision by the National Institute of Standards and Technology (NIST) to change how it maintains the widely used National Vulnerability Database (NVD) has focused attention on the brittle nature of current enterprise vulnerability management processes.