Redirecting you to

Blog Posts

Get expert insights and explore the latest trends in digital trust, public key infrastructure (PKI), certificate lifecycle management (CLM), web security, and postquantum cryptography.

Subscribe
Start typing to search tags.

Advanced Filters

Filter by Tag

Clear Selection

Filter by Date Range

  • Learn More

    This Cybersecurity Awareness Month, Let’s Get Back to Basics

    Blog Post from Sectigo

    Blog Post Oct 27, 2021

    Cybersecurity Awareness Month always represents a good opportunity to reflect on the challenges of the year and start planning for the future. While 2021 hasn’t quite been the sigh of relief that many were hoping for after a chaotic 2020, it has been a year of fascinating developments in the cybersecurity world.

  • Learn More

    A World Where SSL Certificates Do Not Allow Organizational Unit Fields

    Blog Post from Sectigo

    Blog Post Oct 19, 2021

    There’s a healthy discussion in the world of public SSL certificates: the OU field. Standing for Organizational Unit and currently unrestricted in its use, many IT professionals feel the data often placed in this field leads to confusion. It is an unauthenticated field that may soon be greatly restricted in usage — or even eliminated altogether.

  • Learn More

    What Is the PSD2 Regulation? Purpose & Compliance

    Blog Post from Sectigo

    Blog Post Sep 29, 2021

    Enacted by the European Union (EU) in 2007, the original Payment Service Providers Directive (PSD) was designed to help develop a single payment market for the entire EU in response to the proliferation of online banking. It connected a new class of fintech organizations with existing banks and retailers in an effort to create efficiency and innovation within an industry that had become stagnant. The European Commission added an amendment to the legislation in 2013, creating PSD2.

  • Learn More

    Digital signature legal requirements

    Blog Post from Sectigo

    Blog Post Sep 09, 2021

    Digital signatures use PKI for secure, legal authentication worldwide, ensuring document integrity, authenticity, and compliance.

  • Learn More

    What Is Code Signing?

    Blog Post from Sectigo

    Blog Post Sep 09, 2021

    Code signing is used to authenticate the originator and authenticity of a file. The identity is inserted directly into a program via code or with an executable file (.exe) by creating a digital signature through hashing a private key. The corresponding public key can be used to verify that the file is intact, original, and unmodified.

  • Learn More

    Code Signing Best Practices

    Blog Post from Sectigo

    Blog Post Sep 09, 2021

    Code signing and the use of digital certificates underpin the concept of trust in the modern technological landscape.

  • Learn More

    What are the different types of e-signatures?

    Blog Post from Sectigo

    Blog Post Sep 09, 2021

    Discover the three types of e-signatures—SES, AES, and QES—plus their uses, legalities, and benefits for contracts, agreements, and secure documents.

  • Learn More

    Modifications to Available File-Based Methods of DCV

    Blog Post from Sectigo

    Blog Post Sep 07, 2021

    In compliance with pending policy changes by CA/B Forum ballot SC45; Sectigo will update the circumstances under which it can employ file-based DCV.

  • Learn More

    What is a self-signed SSL certificate?

    Blog Post from Sectigo

    Blog Post Jul 07, 2021

    Self-signed certificates are free and quick to create but risky for public use. Best suited for internal testing, not secure for sensitive data.

  • Learn More

    AWS Certificates vs. Public CA Certificates

    Blog Post from Sectigo

    Blog Post Jul 07, 2021

    Today's modern enterprises must secure their data and applications that run and are hosted in the cloud using Amazon Web Services (AWS). Digital certificates based on public key infrastructure (PKI), such as SSL/TLS certificates and code signing certificates, are the gold standard for authentication and encryption of data and applications in the cloud. But organizations that use AWS have a choice of certificate authorities (CAs) that can issue certificates. This article helps you understand the differences between Public CA certificates and those provided by Amazon.

  • Learn More

    What is SHA encryption? SHA-1 vs SHA-2

    Blog Post from Sectigo

    Blog Post Jul 07, 2021

    SHA encryptions secure data using hash functions like SHA-2 and SHA-3. Use SHA-256 for better security in certificates, TLS/SSL, and data protection.

  • Learn More

    The Truth About the Real Impact of SMB Website Breaches

    Blog Post from Sectigo

    Blog Post Jun 30, 2021

    If you’re like many small-to-medium-sized businesses (SMB) website security decision-makers, you may think your business is too small for hackers to take notice of, or that a breach won’t happen to you. But you can’t just call up cybercriminals and ask them not to hack your site or force an outage, or even hope to slip under their radar because you are not a multi-billion dollar business. Read on to observe a recent survey on SMBs and the information we have gathered about the impact of website breaches.