Redirecting you to

Blog Posts

Get expert insights and explore the latest trends in digital trust, public key infrastructure (PKI), certificate lifecycle management (CLM), web security, and postquantum cryptography.

Subscribe
Start typing to search tags.

Advanced Filters

Filter by Tag

Clear Selection

Filter by Date Range

  • Learn More

    CRN Names Jennifer Palmes of Sectigo a Rising Female Star

    Blog Post from Sectigo

    Blog Post Jul 12, 2022

    Sectigo’s Director of Channels Is One of 100 Standout Leaders Recognized for Dedication to the IT Channel

  • Learn More

    Is Your Passwordless Authentication Solution Truly Passwordless?

    Blog Post from Sectigo

    Blog Post May 09, 2022

    In a world where many different users, mobile devices, and automated processes need to access networked resources, passwords are no longer an effective method to authenticate every single identity in an organization. Sophisticated attacks like phishing, keyloggers, and brute force cracking are highly capable of stealing passwords. Overall, this creates a very real scenario where passwords have become an outdated form of authentication with weak security, bad user experience, and added helpdesk burden all rolled into one.

  • Learn More

    What is Web3 and How Does It Work?

    Blog Post from Sectigo

    Blog Post Apr 18, 2022

    Web3 offers a potential solution for making it easier to locate an original source for content on the World Wide Web. We go over what Web 3 is & how it works.

  • Learn More

    What Is Zero Trust Network Architecture?

    Blog Post from Sectigo

    Blog Post Apr 11, 2022

    What is Zero Trust Network Architecture? Learn about the definition, how it relates to cyber security, how it's implemented & more from Sectigo®.

  • Learn More

    How to Manage X.509 Digital Certificates

    Blog Post from Sectigo

    Blog Post Apr 04, 2022

    X.509 digital certificates are used to manage identity & security in internet communications & computer networking. Learn about managing X.509 certificates

  • Learn More

    Benefits of Cloud PKI vs. On-Premise PKI

    Blog Post from Sectigo

    Blog Post Apr 01, 2022

    Running PKI in the cloud is quickly becoming the new normal. We go over the benefits of cloud PKI along with important steps that go with this approach.

  • Learn More

    Why Privileged Access Management (PAM)? Importance, Risks & More

    Blog Post from Sectigo

    Blog Post Mar 29, 2022

    Privileged Access Management can help enhance network security - but it does come with risks. Learn about these PAM risks & best practices to avoid them.

  • Learn More

    What Is SASE & How Does It Relate to Zero Trust Network Access (ZTNA)?

    Blog Post from Sectigo

    Blog Post Mar 25, 2022

    We go over the meaning of secure access service edge (SASE), the meaning of zero-trust network access (ZTNA), how they work together & more.

  • Learn More

    The 3 Key Benefits of Credential Vaults

    Blog Post from Sectigo

    Blog Post Mar 24, 2022

    Enterprises today increasingly rely on automated processes and systems, however the way this automation manifests itself is different for each organization. For example, automated DevOps container environments help to decrease the time to market for development. Connected IoT devices continuously optimize controls for everything within a business from an assembly line to the air conditioning, and automated workflows keep many aspects of operations running smoothly. The fact is, all departments stand to benefit from streamlined operations through the growing number of Robotic Process Automation (RPA) initiatives.

  • Learn More

    Sectigo Delivers Automated CLM for Apache HTTP Web Server Users

    Blog Post from Sectigo

    Blog Post Mar 04, 2022

    Sectigo is pleased to offer a new integration in its market-leading Certificate Lifecycle Management (CLM) solution, Sectigo Certificate Manager (SCM), for users of the open-source web server software Apache® HTTP Server. The latest enhancements fill a market need to directly automate the deployment and renewal of digital certificates natively on Apache HTTP Server without additional software.

  • Learn More

    Deepfake Cybersecurity: What It Is & More

    Blog Post from Sectigo

    Blog Post Feb 24, 2022

    With deepfake technology, bad actors can impersonate others and gain access to sensitive data. Learn more about this threat to cybersecurity and how to prevent it.

  • Learn More

    Baseline Requirements for CAs explained

    Blog Post from Sectigo

    Blog Post Feb 23, 2022

    Learn about the Baseline Requirements for CAs, their role in browser trust, and what happens when CAs fail to comply.