Redirecting you to
Contact Us

Blog Posts

Expert commentary on the latest issues and trends in online trust, digital certificates, web security, IoT, and identity solutions by established leaders in digital security.

Subscribe
Start typing to search tags.

Advanced Filters

Filter by Tag

Clear Selection

Filter by Date Range

  • Learn More

    What Is Zero Trust Network Architecture?

    A Blog Post from Sectigo

    Blog Post Apr 11, 2022

    What is Zero Trust Network Architecture? Learn about the definition, how it relates to cyber security, how it's implemented & more from Sectigo®.

  • Learn More

    How to Manage X.509 Digital Certificates

    A Blog Post from Sectigo

    Blog Post Apr 04, 2022

    X.509 digital certificates are used to manage identity & security in internet communications & computer networking. Learn about managing X.509 certificates

  • Learn More

    Benefits of Cloud PKI vs. On-Premise PKI

    A Blog Post from Sectigo

    Blog Post Apr 01, 2022

    Running PKI in the cloud is quickly becoming the new normal. We go over the benefits of cloud PKI along with important steps that go with this approach.

  • Learn More

    Why Privileged Access Management (PAM)? Importance, Risks & More

    A Blog Post from Sectigo

    Blog Post Mar 29, 2022

    Privileged Access Management can help enhance network security - but it does come with risks. Learn about these PAM risks & best practices to avoid them.

  • Learn More

    What Is SASE & How Does It Relate to Zero Trust Network Access (ZTNA)?

    A Blog Post from Sectigo

    Blog Post Mar 25, 2022

    We go over the meaning of secure access service edge (SASE), the meaning of zero-trust network access (ZTNA), how they work together & more.

  • Learn More

    The 3 Key Benefits of Credential Vaults

    A Blog Post from Sectigo

    Blog Post Mar 24, 2022

    Enterprises today increasingly rely on automated processes and systems, however the way this automation manifests itself is different for each organization. For example, automated DevOps container environments help to decrease the time to market for development. Connected IoT devices continuously optimize controls for everything within a business from an assembly line to the air conditioning, and automated workflows keep many aspects of operations running smoothly. The fact is, all departments stand to benefit from streamlined operations through the growing number of Robotic Process Automation (RPA) initiatives.

  • Learn More

    Sectigo Delivers Automated CLM for Apache HTTP Web Server Users

    A Blog Post from Sectigo

    Blog Post Mar 04, 2022

    Sectigo is pleased to offer a new integration in its market-leading Certificate Lifecycle Management (CLM) solution, Sectigo Certificate Manager (SCM), for users of the open-source web server software Apache® HTTP Server. The latest enhancements fill a market need to directly automate the deployment and renewal of digital certificates natively on Apache HTTP Server without additional software.

  • Learn More

    Deepfake Cybersecurity: What It Is & More

    A Blog Post from Sectigo

    Blog Post Feb 24, 2022

    With deepfake technology, bad actors can impersonate others and gain access to sensitive data. Learn more about this threat to cybersecurity and how to prevent it.

  • Learn More

    What Are the Baseline Requirements?

    A Blog Post from Sectigo

    Blog Post Feb 23, 2022

    For the first decade-plus of their lifespan as a technology, publicly trusted digital certificates operated with little oversight, transparency, or consistency in operating principles. To create predictable, reliable behavior among public Certificate Authorities (CAs) the CA/Browser Forum undertook the creation of its Baseline Requirements, which first went into effect in 2012.

  • Learn More

    Enterprise Use Cases for a Private Certificate Authority

    A Blog Post from Sectigo

    Blog Post Feb 16, 2022

    A Private Certificate Authority provides enterprises with the benefits of PKI authentication while allowing for more control. Learn the different use cases

  • Learn More

    What Is Certificate Transparency?

    A Blog Post from Sectigo

    Blog Post Feb 10, 2022

    Certificate Transparency (CT) provides a system to monitor and audit all public SSL certificates that are being issued by CAs. A number of different parties, including public CAs, web browser vendors, CT log operators, and others, are involved in ensuring the CT framework functions correctly.

  • Learn More

    Attention Developers: Be Careful When Copying Code

    A Blog Post from Sectigo

    Blog Post Feb 02, 2022

    A new attack vector has been making the rounds, and developers of all kinds will want to pay attention. Many IT professionals may think that their experience in the cyber-world makes them immune to malware, phishing, and other security breaches, but this new method is targeted directly at developers—and it’s hitting them through a mainstay of their development toolbox: copy-pasted code snippets.