-
Learn More
This Cybersecurity Awareness Month, Let’s Get Back to Basics
Blog Post from Sectigo
Blog Post Oct 27, 2021Cybersecurity Awareness Month always represents a good opportunity to reflect on the challenges of the year and start planning for the future. While 2021 hasn’t quite been the sigh of relief that many were hoping for after a chaotic 2020, it has been a year of fascinating developments in the cybersecurity world.
-
Learn More
A World Where SSL Certificates Do Not Allow Organizational Unit Fields
Blog Post from Sectigo
Blog Post Oct 19, 2021There’s a healthy discussion in the world of public SSL certificates: the OU field. Standing for Organizational Unit and currently unrestricted in its use, many IT professionals feel the data often placed in this field leads to confusion. It is an unauthenticated field that may soon be greatly restricted in usage — or even eliminated altogether.
-
Learn More
What Is the PSD2 Regulation? Purpose & Compliance
Blog Post from Sectigo
Blog Post Sep 29, 2021Enacted by the European Union (EU) in 2007, the original Payment Service Providers Directive (PSD) was designed to help develop a single payment market for the entire EU in response to the proliferation of online banking. It connected a new class of fintech organizations with existing banks and retailers in an effort to create efficiency and innovation within an industry that had become stagnant. The European Commission added an amendment to the legislation in 2013, creating PSD2.
-
Learn More
Digital signature legal requirements
Blog Post from Sectigo
Blog Post Sep 09, 2021Digital signatures use PKI for secure, legal authentication worldwide, ensuring document integrity, authenticity, and compliance.
-
Learn More
What Is Code Signing?
Blog Post from Sectigo
Blog Post Sep 09, 2021Code signing is used to authenticate the originator and authenticity of a file. The identity is inserted directly into a program via code or with an executable file (.exe) by creating a digital signature through hashing a private key. The corresponding public key can be used to verify that the file is intact, original, and unmodified.
-
Learn More
Code Signing Best Practices
Blog Post from Sectigo
Blog Post Sep 09, 2021Code signing and the use of digital certificates underpin the concept of trust in the modern technological landscape.
-
Learn More
What are the different types of e-signatures?
Blog Post from Sectigo
Blog Post Sep 09, 2021Discover the three types of e-signatures—SES, AES, and QES—plus their uses, legalities, and benefits for contracts, agreements, and secure documents.
-
Learn More
Modifications to Available File-Based Methods of DCV
Blog Post from Sectigo
Blog Post Sep 07, 2021In compliance with pending policy changes by CA/B Forum ballot SC45; Sectigo will update the circumstances under which it can employ file-based DCV.
-
Learn More
What is a self-signed SSL certificate?
Blog Post from Sectigo
Blog Post Jul 07, 2021Self-signed certificates are free and quick to create but risky for public use. Best suited for internal testing, not secure for sensitive data.
-
Learn More
AWS Certificates vs. Public CA Certificates
Blog Post from Sectigo
Blog Post Jul 07, 2021Today's modern enterprises must secure their data and applications that run and are hosted in the cloud using Amazon Web Services (AWS). Digital certificates based on public key infrastructure (PKI), such as SSL/TLS certificates and code signing certificates, are the gold standard for authentication and encryption of data and applications in the cloud. But organizations that use AWS have a choice of certificate authorities (CAs) that can issue certificates. This article helps you understand the differences between Public CA certificates and those provided by Amazon.
-
Learn More
What is SHA encryption? SHA-1 vs SHA-2
Blog Post from Sectigo
Blog Post Jul 07, 2021SHA encryptions secure data using hash functions like SHA-2 and SHA-3. Use SHA-256 for better security in certificates, TLS/SSL, and data protection.
-
Learn More
The Truth About the Real Impact of SMB Website Breaches
Blog Post from Sectigo
Blog Post Jun 30, 2021If you’re like many small-to-medium-sized businesses (SMB) website security decision-makers, you may think your business is too small for hackers to take notice of, or that a breach won’t happen to you. But you can’t just call up cybercriminals and ask them not to hack your site or force an outage, or even hope to slip under their radar because you are not a multi-billion dollar business. Read on to observe a recent survey on SMBs and the information we have gathered about the impact of website breaches.