Redirecting you to
Contact Us

Blog Posts

Expert commentary on the latest issues and trends in online trust, digital certificates, web security, IoT, and identity solutions by established leaders in digital security.

Subscribe
Start typing to search tags.

Advanced Filters

Filter by Tag

Clear Selection

Filter by Date Range

  • Learn More

    Embracing a New Chapter: My Journey to Sectigo as Chief Financial Officer

    A Blog Post from Sectigo

    Blog Post Sep 07, 2023

    I'm thrilled to share the exciting news that I recently joined the Sectigo family as Chief Financial Officer, and I couldn't be more enthusiastic about this new chapter in my career.

    Firstly, I want to express my gratitude to Kevin Weiss, the CEO of Sectigo, for his warm welcome. He mentioned that he's looking forward to sharing in my success once more, and that's something I'm genuinely excited about. But before we dive into the present, let me provide a little context.

    Over my more than three-decade career, I've had the privilege of working in various leadership roles in the software technology, financial, and professional services industries. My journey has taken me through many challenges and opportunities, and I've learned valuable lessons at every step.

    My most recent role was as the CFO of Spireon, Inc., a vehicle intelligence company. During my nearly decade-long tenure there, I had the privilege of contributing to the company's success and driving increased enterprise value. It was a remarkable journey that equipped me with the experience needed to take on new challenges.

    So, after all this time, why Sectigo, you might ask?

    Well, Sectigo presents an incredibly exciting opportunity in the Certificate Lifecycle Management space. The company is poised for tremendous growth, and I'm thrilled to be part of this journey. I believe that my experience in guiding companies through transitions associated with mergers, acquisitions, and accelerated growth will be invaluable in supporting Sectigo's strategic goals.

    Before Spireon, I spent over eight years at Deloitte, one of the world's leading international accounting firms. This experience sharpened my financial acumen and provided a solid foundation in accounting principles.

    I hold a Bachelor of Science in Accounting and Finance from California State University and am a Certified Public Accountant (inactive), and I'm excited to put this knowledge to use in my new role at Sectigo.

    My appointment as CFO at Sectigo is effective immediately, and I'm eager to collaborate with the executive team, our investors, and the entire Sectigo family to contribute to the company's continued success.

    I'd like to express my gratitude for this incredible opportunity, and I can't wait to see what the future holds for Sectigo. Together, we're going to achieve great things, and I'm excited to be a part of this journey. Thank you all for your support, and here's to an exciting future!

  • Learn More

    SSL Deprecation: Understanding the Evolution of Security Protocols

    A Blog Post from Sectigo

    Blog Post Aug 31, 2023

    SSL protocol deprecation, the SSL 3.0 end-of-life date, vulnerabilities the TLS protocol fixed, and why the term SSL certificate is still used.

  • Learn More

    TLS Server Certificates: What They Are and How They Secure Web Transactions

    A Blog Post from Sectigo

    Blog Post Aug 29, 2023

    Read our guide on TLS server certificates to learn what they are, the different types, how they secure web transactions, and how to manage them.

  • Learn More

    What Is TLS and How Google Uses It

    A Blog Post from Sectigo

    Blog Post Aug 24, 2023

    Transport Layer Security (TLS) is a cryptographic protocol for securing online communications. Learn what it is, how it works, and how Google uses it.

  • Learn More

    TLS 1.2 Handshake vs TLS 1.3 Handshake

    A Blog Post from Sectigo

    Blog Post Aug 21, 2023

    What are the differences between a TLS 1.2 & TLS 1.3 handshake? Sectigo explores the vulnerabilities found in 1.2, security enhancements in 1.3, and more.

  • Learn More

    Elevate your AD CS capabilities with Sectigo Certificate Manager

    A Blog Post from Sectigo

    Blog Post Aug 17, 2023

    The rapid digital transformation of businesses has led to increasingly complex and heterogeneous IT environments.

  • Learn More

    Certificate Authority Hierarchy: How It Works

    A Blog Post from Sectigo

    Blog Post Aug 15, 2023

    Android recently issued a list of root certificates that it has added to Android 14.

  • Learn More

    Demystifying Public Certificates vs. Private Certificates: Key Pillars of Digital Security

    A Blog Post from Sectigo

    Blog Post Aug 11, 2023

    Certificates are digitally signed documents that enable secure digital communication and authentication. Explore public vs. private certificate roles.

  • Learn More

    The Crucial Role of Certificate Authorities in Building Trust in a Digital World

    A Blog Post from Sectigo

    Blog Post Aug 09, 2023

    Certificate Authorities (CAs) are trusted entities that issue SSL/TLS certificates for secure communication. Explore their role in securing online data.

  • Learn More

    Stages of the Certificate Lifecycle Explained in Simple Terms

    A Blog Post from Sectigo

    Blog Post Aug 07, 2023

    Digital certificates ensure secure, encrypted connections between devices, websites and applications. Learn the certificate lifecycle and how to manage it.

  • Learn More

    Sectigo and Multipoint Group Join Forces to Enhance Digital Security Solutions for Businesses Worldwide

    A Blog Post from Sectigo

    Blog Post Aug 04, 2023


    In an exciting development for the world of cybersecurity, Sectigo, a global leader in automated Certificate Lifecycle Management (CLM) and digital certificates, has joined hands with Multipoint Group, a leading distributor of IT cyber solutions. This strategic partnership is set to fortify digital security solutions for businesses across the globe, empowering them to take a proactive stance against cyber risks and safeguard their invaluable digital assets.

    The collaboration between Sectigo and Multipoint Group is a dynamic response to the ever-evolving threat landscape, where cyber adversaries are constantly devising new ways to exploit vulnerabilities. Together, these two powerhouses are committed to providing businesses with a comprehensive suite of cybersecurity solutions that are not only robust and scalable but also capable of nurturing a safe digital environment, fostering the much-needed digital trust.

    Sectigo brings its wealth of expertise in automation, certificate lifecycle management, and public/private digital certificates to the table. With a stellar track record of establishing digital trust for businesses worldwide, Sectigo's top-tier CLM platform automates the lifecycle management of all digital certificates. This approach is instrumental in securing digital identities, devices, and transactions, painting a promising picture of enhanced security for the digital realm.

    The crux of this partnership lies in its ability to foster innovation on an ongoing basis. Sectigo and Multipoint Group are geared to stay ahead of emerging threats, crafting security solutions that not only adapt to the ever-evolving digital landscapes but also lay a solid foundation of digital trust. This mutual commitment to innovation is poised to provide a powerful shield against the relentless wave of cyber threats.

    What's more, Multipoint Group has exciting news to share: the company is all set to make its presence felt at GITEX DUBAI, one of the Middle East's premier technology conferences, scheduled for October 2023. During this event, Multipoint Group will shine a spotlight on its groundbreaking cybersecurity solutions and showcase its collaborative endeavors with Sectigo in tackling global digital security challenges head-on. Visitors to GITEX Dubai can expect to get an up-close look at Sectigo's innovative solutions designed to counter evolving cyber threats.

    Jennifer Binet, Senior Vice President of Enterprise Sales at Sectigo, expressed her enthusiasm about this partnership, stating, "We are thrilled to join forces with Multipoint Group and offer businesses a comprehensive approach to cybersecurity. As the usage of digital certificates continues to surge among enterprises, the necessity for a robust and automated certificate lifecycle management solution has never been more pronounced. Our collaboration with Multipoint Group allows us to combine Sectigo's state-of-the-art management platform with Multipoint's advanced cybersecurity distribution services."

    Echoing this sentiment, Ricardo Resnik, CEO of Multipoint Group, emphasized, "Our partnership with Sectigo signifies a significant stride forward in our mission to provide cutting-edge cybersecurity solutions. Together, we are empowering businesses to take proactive steps in risk mitigation and securing their digital assets, thus allowing them to channel their energy into fostering growth and innovation."

    In essence, the Sectigo and Multipoint Group alliance sets the stage for a new era of enhanced digital security solutions. Their shared commitment to innovation, comprehensive protection, and fostering digital trust holds the promise of a safer and more resilient digital landscape for businesses worldwide. As cyber threats continue to evolve, the collaboration stands strong as a beacon of cybersecurity excellence. Stay tuned for further updates on this dynamic partnership, and be sure to catch the Multipoint Group's compelling showcase at GITEX DUBAI 2023!

  • Learn More

    Understanding the Different Types of Certificate Authorities 

    A Blog Post from Sectigo

    Blog Post Jul 28, 2023

    Establishing trust online is a crucial component of collaboration in the digital age. From using a third-party vendor to shopping online to communicating via email, companies and individuals rely on this trust to do business. How can they know they are communicating with the right person and not an actor behind a phishing scheme?

    A certificate authority (CA) plays a vital role in making this happen. CAs follow strict industry standards, verify identities, and issue digital certificates. Here is your guide to what a CA is, why it matters, and the different types of CAs available today.

    What Is a Certificate Authority (CA)?

    Certificates ensure a system is who they say they are, but the system must also be assured that the certificate itself is genuine. This is where trusted third parties come into play. Certificate authorities are independent bodies that issue and vouch for certificates.

    As a vital component of the public key infrastructure (PKI), CAs create digital certificates that cryptographically link public keys with the owners’ identities. The CA is responsible for validating the identity of the entity associated with a given public key and issuing the digital certificates that attest to this identity. The CA follows specific protocols to verify the requester's identity before issuing the certificate. This protocol involves checking official documentation or performing a background check.

    CAs also have mechanisms for revoking certificates. Revocation happens when a key associated with a certificate is compromised or if the entity that was issued a certificate no longer exists.

    Importance of Certificate Authorities

    CAs play a crucial role in ensuring internet security. Certificates can secure digital signatures and establish secure network connections via protocols such as HTTPS. 

    Here are some of the top reasons why CAs are critical in the digital world:

    • Establishing trust. CAs provide the foundation of trust on the internet. For example, when users connect to a website, their browser trusts the website if it has a valid certificate issued by a trusted CA. Without this mechanism, it’s hard to establish trust between two parties that have never interacted.
    • Verifying identity. Certificate issuance requires verifying the requester’s identity. This ensures that the entity requesting a certificate is who it claims to be.
    • Preventing data theft. Secure connections established using certificates help prevent unauthorized data access. When data is sent over a secure connection, encryption makes it unreadable even if bad actors successfully intercept it.
    • Protecting against scams. CAs help protect users against phishing attacks and other scams. When users navigate websites, they can be confident the site is legitimate and is not a malicious imitation built to steal personal information if it has a valid certificate.
    • Revoking certificates. If a certificate is issued incorrectly or the private key is compromised, the CA can revoke the certificate and prevent further use.


    The Different Types of Certificate Authorities

    Each type of CA and the certificates they issue offer pros and cons. Organizations need to consider which is best depending on their goals, industry regulations, and the level of trust required. 

    Below, we separated the types of CAs based on function, authority, products, and hierarchy to more clearly explain the advantages and drawbacks of each type of certificate.

    Types by Function

    • Domain validated (DV) CAs. DV certificates are simpler and require less rigorous checking. DV CAs issue certificates after validating only the ownership or control over the domain for the requested certificate. DV certificates are usually cheaper and easier to obtain but provide lower trust because they don’t include the identity of the organization that owns the domain.
    • Organization validated (OV) CAs. OV CAs go a step beyond DV CAs by verifying organizational details such as name, legal existence, and physical location in addition to domain ownership. OV certificates offer a higher level of trust than DV certificates because they associate the domain with a specific organization. However, they are more expensive and take longer to issue.
    • Self-signed CAs. A self-signed certificate is not issued by a recognized CA. Instead, the entity that will be using it generates and signs it, which means there is no external verification of the certificate information. As a result, self-signed certificates are typically not trusted by web browsers or other software, and they generate a warning when users encounter them. While they are useful in testing or internal use cases, they’re not suitable for secure public internet communications.
    • Extended validation (EV) CAs. EV certificates require the most stringent verification process. In addition to verifying domain ownership and organizational details, the EV CA verifies the organization's physical and operational existence, the requester’s identity and authority, and the organization’s policy and procedures for requesting an EV certificate. EV certificates have the highest level of trust and are often used by enterprises and financial institutions. While they are the most expensive and time-consuming to obtain, they are valuable for entities that want to establish the highest level of trust with their users.


    Types by Authority

    • Public CAs. Public CAs, also called root CAs, issue digital certificates for public-facing software and servers, which are used for secure communication on the internet. Public CAs are trusted by browser and operating system vendors, and their root certificates are embedded in web browsers and operating systems. They follow stringent protocols and regulations to verify the entity identity, depending on the type of certificate requested.
    • Private/internal CAs. Private or internal CAs are used within an organization to issue certificates for internal use. They are typically not trusted outside the organization.


    Types by Product

    • Government CAs. Government agencies usually establish government CAs to issue certificates for government entities and, in some cases, citizens and businesses within a country. They often adhere to strict identity validation procedures and policies mandated by relevant government regulations. One example is the U.S. Federal Public Key Infrastructure (FPKI).
    • Commercial CAs. Commercial CAs offer certificate services to the public. They provide a variety of certificate types, including DV, OV, and EV certificates, to secure websites, enable secure email communication, authenticate users, and more. Commercial CAs like Sectigo offer robust customer support, various wildcard and multi-domain certificates, and a longer certificate lifespan.
    • Open-source CAs. Open-source CAs provide certificates using open-source software and principles. Often, their basic services are free to use, and their underlying software is open-source, which the public can inspect and contribute to. The most notable example is Let’s Encrypt, a nonprofit CA run by the Internet Security Research Group. However, they only offer DV certificates, which have a lower level of trust and typically have a shorter lifespan.


    Hierarchy CAs

    • Issuing CAs. The authenticity of issuing CAs isn’t directly recognized by an operating system but is instead validated by an intermediate CA. Any certificate provided by issuing CAs is deemed reliable if the intermediate CA can successfully authenticate it.
    • Intermediate CAs. Intermediate CAs sit between the root (or public) CA and the issuing CA in a hierarchical PKI. They are issued a certificate by the root CA, and they can then use that certificate to issue certificates to intermediate CAs or end entities directly.


    Establishing Trust in the Digital World

    Certificate authorities play a fundamental role in establishing the security and integrity of digital communications. They help validate identities, issue digital certificates, and build trust among users and entities. CAs also offer different types of certificates to meet organizational needs and circumstances.

    If you need a robust, proven certificate authority to secure your website, authenticate users, and facilitate secure email communications, Sectigo can help. As one of the world’s largest commercial CA, Sectigo offers a variety of certificate types to fit your needs, backed by comprehensive customer support. 

    Contact Sectigo today and explore our suite of digital certificate solutions.