-
Learn More
CRN Names Jennifer Palmes of Sectigo a Rising Female Star
Blog Post from Sectigo
Blog Post Jul 12, 2022Sectigo’s Director of Channels Is One of 100 Standout Leaders Recognized for Dedication to the IT Channel
-
Learn More
Is Your Passwordless Authentication Solution Truly Passwordless?
Blog Post from Sectigo
Blog Post May 09, 2022In a world where many different users, mobile devices, and automated processes need to access networked resources, passwords are no longer an effective method to authenticate every single identity in an organization. Sophisticated attacks like phishing, keyloggers, and brute force cracking are highly capable of stealing passwords. Overall, this creates a very real scenario where passwords have become an outdated form of authentication with weak security, bad user experience, and added helpdesk burden all rolled into one.
-
Learn More
What is Web3 and How Does It Work?
Blog Post from Sectigo
Blog Post Apr 18, 2022Web3 offers a potential solution for making it easier to locate an original source for content on the World Wide Web. We go over what Web 3 is & how it works.
-
Learn More
What Is Zero Trust Network Architecture?
Blog Post from Sectigo
Blog Post Apr 11, 2022What is Zero Trust Network Architecture? Learn about the definition, how it relates to cyber security, how it's implemented & more from Sectigo®.
-
Learn More
How to Manage X.509 Digital Certificates
Blog Post from Sectigo
Blog Post Apr 04, 2022X.509 digital certificates are used to manage identity & security in internet communications & computer networking. Learn about managing X.509 certificates
-
Learn More
Benefits of Cloud PKI vs. On-Premise PKI
Blog Post from Sectigo
Blog Post Apr 01, 2022Running PKI in the cloud is quickly becoming the new normal. We go over the benefits of cloud PKI along with important steps that go with this approach.
-
Learn More
Why Privileged Access Management (PAM)? Importance, Risks & More
Blog Post from Sectigo
Blog Post Mar 29, 2022Privileged Access Management can help enhance network security - but it does come with risks. Learn about these PAM risks & best practices to avoid them.
-
Learn More
What Is SASE & How Does It Relate to Zero Trust Network Access (ZTNA)?
Blog Post from Sectigo
Blog Post Mar 25, 2022We go over the meaning of secure access service edge (SASE), the meaning of zero-trust network access (ZTNA), how they work together & more.
-
Learn More
The 3 Key Benefits of Credential Vaults
Blog Post from Sectigo
Blog Post Mar 24, 2022Enterprises today increasingly rely on automated processes and systems, however the way this automation manifests itself is different for each organization. For example, automated DevOps container environments help to decrease the time to market for development. Connected IoT devices continuously optimize controls for everything within a business from an assembly line to the air conditioning, and automated workflows keep many aspects of operations running smoothly. The fact is, all departments stand to benefit from streamlined operations through the growing number of Robotic Process Automation (RPA) initiatives.
-
Learn More
Sectigo Delivers Automated CLM for Apache HTTP Web Server Users
Blog Post from Sectigo
Blog Post Mar 04, 2022Sectigo is pleased to offer a new integration in its market-leading Certificate Lifecycle Management (CLM) solution, Sectigo Certificate Manager (SCM), for users of the open-source web server software Apache® HTTP Server. The latest enhancements fill a market need to directly automate the deployment and renewal of digital certificates natively on Apache HTTP Server without additional software.
-
Learn More
Deepfake Cybersecurity: What It Is & More
Blog Post from Sectigo
Blog Post Feb 24, 2022With deepfake technology, bad actors can impersonate others and gain access to sensitive data. Learn more about this threat to cybersecurity and how to prevent it.
-
Learn More
Baseline Requirements for CAs explained
Blog Post from Sectigo
Blog Post Feb 23, 2022Learn about the Baseline Requirements for CAs, their role in browser trust, and what happens when CAs fail to comply.