Redirecting you to
Contact Us

Blog Posts

Expert commentary on the latest issues and trends in online trust, digital certificates, web security, IoT, and identity solutions by established leaders in digital security.

Subscribe
Start typing to search tags.

Advanced Filters

Filter by Tag

Clear Selection

Filter by Date Range

  • Learn More

    Does Your CLM Integrate with Your Tech Stack? Here’s Why It Should

    A Blog Post from Sectigo

    Blog Post Feb 15, 2023

    The challenges enterprise IT security teams face today are nothing like they were five years ago. Today enterprises face globally distributed networks of bad actors that wield increasingly sophisticated technological and social tools, designed to infiltrate secure systems and exploit identity-based vulnerabilities.

  • Learn More

    6 Reasons Why CA Agnostic CLM Is Vital

    A Blog Post from Sectigo

    Blog Post Feb 06, 2023

    Digital trust is the foundation for secure business operations. This requires establishing and maintaining a strong cryptographic identity for every single user and machine (i.e. software, hardware, device, container, bot, etc.) attempting to access a network so the enterprise can verify who, or what, is interacting with its system.

  • Learn More

    Sectigo Announces Further Advancements to Industry-Leading CLM Platform

    A Blog Post from Sectigo

    Blog Post Jan 30, 2023

    Certificate Lifecycle Management (CLM) is increasingly becoming mission-critical for IT leaders as they work to establish digital trust for their enterprises in remote and hybrid work environments. CISOs and their teams must acquire and manage multiple, expensive, and siloed public key infrastructure and CLM solutions to tackle human and machine identity management.

  • Learn More

    An Exciting Development in Quantum-Safe Cryptography: ISARA Dedicates Four Digital Certificate Patents to the Public

    A Blog Post from Sectigo

    Blog Post Dec 02, 2022

    Quantum computing will render traditional public key infrastructure (PKI), as the world knows it, no longer fit for purpose in the coming years. This poses a very real threat to the information security systems enterprises rely on to protect freedom, liberty, privacy, and security.

  • Learn More

    MFA Fatigue: Rethinking How Enterprises Authenticate

    A Blog Post from Sectigo

    Blog Post Nov 21, 2022

    Not all forms of multi-factor authentication (MFA) are created equal and the forms that are based on one-time passcodes have turned into corporate liabilities. One-time passcodes that are entered into malicious login pages or entered into a compromised endpoint can be harvested by an attacker and utilized to log in along with a harvested username and password.

  • Learn More

    OpenSSL Vulnerability Patch Released

    A Blog Post from Sectigo

    Blog Post Nov 01, 2022

    The OpenSSL Project team has released the patch for a significant security vulnerability identified within version 3 of the OpenSSL library.

  • Learn More

    Why Crypto Agility Is Crucial to Navigating Quantum Computing

    A Blog Post from Sectigo

    Blog Post Sep 19, 2022

    Today the world’s data is secured with technology that in some ways acts like a passport. Like passports, this technology – a public key infrastructure (PKI) digital certificate – contains identity information related to the holder. In the digital world, digital certificates act as a “passport” for humans and the machines (such as software, code, bots, IoT/OT, laptops, and devices) they use.

  • Learn More

    Who Are NIST’s Post-Quantum Algorithm Winners?

    A Blog Post from Sectigo

    Blog Post Sep 12, 2022

    Quantum computing’s arrival will cause a ripple effect touching every corner of the technological landscape. In general terms, quantum computers lean on quantum physics to run multiple processes simultaneously, making them able to solve certain complex problems much more quickly than traditional computers can today.

  • Learn More

    5 Ways to Prepare Now for Quantum Computing

    A Blog Post from Sectigo

    Blog Post Sep 06, 2022

    For nearly 50 years, public key infrastructure (PKI) has provided a secure cryptographic foundation for the world’s data. But in the next few years, quantum computers are destined to render the current cryptographic algorithms that secure devices and the people who use them obsolete.

  • Learn More

    CRN Names Jennifer Palmes of Sectigo a Rising Female Star

    A Blog Post from Sectigo

    Blog Post Jul 12, 2022

    Sectigo’s Director of Channels Is One of 100 Standout Leaders Recognized for Dedication to the IT Channel

  • Learn More

    Is Your Passwordless Authentication Solution Truly Passwordless?

    A Blog Post from Sectigo

    Blog Post May 09, 2022

    In a world where many different users, mobile devices, and automated processes need to access networked resources, passwords are no longer an effective method to authenticate every single identity in an organization. Sophisticated attacks like phishing, keyloggers, and brute force cracking are highly capable of stealing passwords. Overall, this creates a very real scenario where passwords have become an outdated form of authentication with weak security, bad user experience, and added helpdesk burden all rolled into one.

  • Learn More

    What is Web3 and How Does It Work?

    A Blog Post from Sectigo

    Blog Post Apr 18, 2022

    Web3 offers a potential solution for making it easier to locate an original source for content on the World Wide Web. We go over what Web 3 is & how it works.