Redirecting you to

Blog Posts

Get expert insights and explore the latest trends in digital trust, public key infrastructure (PKI), certificate lifecycle management (CLM), web security, and postquantum cryptography.

Subscribe
Start typing to search tags.

Advanced Filters

Filter by Tag

Clear Selection

Filter by Date Range

  • Learn More

    Sectigo at CA/Browser Forum Tokyo 2025: Key Takeaways

    Blog Post from Sectigo

    Blog Post Apr 14, 2025

    Sectigo joined CA/B Forum Tokyo 2025 to shape digital trust. Highlights: 47-day certs, Open MPIC, and legal challenges in web security.

  • Learn More

    47 day certificates are happening: what they mean for security

    Blog Post from Sectigo

    Blog Post Apr 14, 2025

    47-day certificate lifecycles are here—reshaping web security, pushing automation, and helping reduce cyber risks in a rapidly evolving digital world.

  • Learn More

    Reasons to replace Microsoft Certificate Authority (AD CS)

    Blog Post from Sectigo

    Blog Post Apr 11, 2025

    AD CS can’t meet modern demands. Discover why enterprises are replacing it with automated CLM platforms that scale and secure today’s digital ecosystems.

  • Learn More

    What is Port 443? How HTTPS secures web traffic

    Blog Post from Sectigo

    Blog Post Apr 10, 2025

    Learn how Port 443 enables encrypted HTTPS communication and protects data using SSL/TLS protocols—crucial for secure web browsing and compliance.

  • Learn More

    What are verified mark certificates (VMC) & how do they work

    Blog Post from Sectigo

    Blog Post Apr 07, 2025

    VMCs display logos in email clients to boost trust, security, and brand visibility. Learn how they work and why your business needs one.

  • Learn More

    How timing attacks threaten postquantum cryptography

    Blog Post from Sectigo

    Blog Post Apr 03, 2025

    Post-quantum cryptography is designed to resist quantum threats, but timing attacks expose new risks. Discover how these attacks work & how to stop them.

  • Learn More

    Subdomain hijacking: risks & prevention tips

    Blog Post from Sectigo

    Blog Post Apr 02, 2025

    Attackers hijack abandoned subdomains to run phishing scams. Prevent this by auditing DNS records, removing outdated entries, and enforcing cloud security.

  • Learn More

    The strategic role of CLM in global enterprise security

    Blog Post from Sectigo

    Blog Post Mar 19, 2025

    Automated CLM enhances security, compliance, and efficiency by managing digital certificates at scale, reinforcing digital trust for global enterprises.

  • Learn More

    Building a new standard in digital trust

    Blog Post from Sectigo

    Blog Post Mar 12, 2025

    Sectigo ensures a smooth transition for Entrust customers with flexible migration options, automated processes, and trusted security solutions.

  • Learn More

    Sectigo CaaS: The Future of Certificate Management

    Blog Post from Sectigo

    Blog Post Mar 11, 2025

    Sectigo’s CaaS simplifies SSL/TLS certificate management with automation, scalability, and flexible pricing, ensuring security, efficiency, and compliance.

  • Learn More

    Why you need a crypto center of excellence today

    Blog Post from Sectigo

    Blog Post Mar 06, 2025

    A CryptoCOE standardizes encryption, enhances security, and prepares businesses for quantum threats with centralized cryptographic governance.

  • Learn More

    The all-or-nothing cybersecurity fallacy: why progress matters

    Blog Post from Sectigo

    Blog Post Mar 03, 2025

    Cybersecurity isn’t all or nothing. Incremental improvements, like automation and shorter SSL/TLS lifespans, reduce risk and strengthen defenses.