We define the cryptographic center of excellence, how such a center of excellence would work, and the benefits it brings to an enterprise.
Recent announcements from Apple lay out a set of expansions in the scope and capability of encryption throughout the Apple ecosystem.
The Secure Hash Algorithms (SHA) is a hashing algorithm that is used to encrypt data. It's essential for any online business to understand what SHA is, how it works, and the different types available.
The CEO of an encrypted data devices and services provider has been indicted on RICO charges related to drug trafficking and money laundering.
Join us for our Q1 Sectigo Pulse webinar, where we'll cover the latest product and compliance news, and how these events might impact you and your business
A recently published paper claims to have destroyed the RSA algorithm, but many people are skeptical.
Join Sectigo VP of IoT/Embedded Solutions Alan Grau and Enterprise Regional Sales Manager Derik Poquiz as they detail emerging IoT security regulations.
We discuss Enigma, history's most famous code system, how it was broken, and how that relates to cryptography today.
Learn about RSA, DSA, & ECC (Elliptic Curve Cryptography) encryption, their differences, performance similarities & how to know which one you need.
We discuss 2020's progress in the quest for quantum-safe encryption, including the algorithm candidate list, hybrid certificates, and IoT devices.
PKI and digital certificates depend on asymmetric encryption. Learn the difference between asymmetric and symmetric secrets & how they fit into encryption.
Learn why crypto agility is more important than ever, why the pace of cryptographic change is going up, and you can do to improve crypto agility.