-
Learn More
Can you get a virus from visiting a website?
Blog Post from Sectigo
Blog Post Oct 08, 2020Visiting websites can spread viruses via exploit kits and vulnerabilities. Update software & use tools like SiteLock for protection.
-
Learn More
What Is Blacklisting, and How Does It Impact a Website?
Blog Post from Sectigo
Blog Post Oct 07, 2020You’ve heard the term “blacklist” used many times, but what does it really mean?
-
Learn More
Tips to Remember During Cybersecurity Awareness Month
Blog Post from Sectigo
Blog Post Oct 07, 2020October is upon us, and that means the beginning of another Cybersecurity Awareness Month. To say that 2020 has been an interesting year would be a vast understatement, and cybersecurity professionals have had to face down new and unexpected challenges like the widespread shift to remote work amid the COVID-19 pandemic.
-
Learn More
How to Get Rid of Malware
Blog Post from Sectigo
Blog Post Oct 01, 2020Malware left unaddressed for too long can cause customers to distrust you, kill your revenues, and damage your reputation in the industry.
If you see the signs of malware on your site, then you need to act fast to get rid of it before its impact is magnified.
-
Learn More
What Is an SSH Key?
Blog Post from Sectigo
Blog Post Sep 24, 2020SSH keys not only improve security but also enable the automation of connected processes, single sign-on (SSO), and identity and access management at scale that today’s businesses require.
-
Learn More
Sectigo’s 2020 Mission ‘Possible’: Business Continuity
Blog Post from Sectigo
Blog Post Sep 24, 2020To say that the year 2020 has forced businesses to face unprecedented challenges would be an understatement. Amid a global pandemic, uncertainty has become the norm and businesses are tackling real questions about what the future may hold for remote work, growth, and profitability.
-
Learn More
Understanding SQL Injection Attacks
Blog Post from Sectigo
Blog Post Sep 16, 2020SQL injection attacks are one of the oldest, most prevalent, and most dangerous vulnerabilities. It is often listed as the number one threat to web security.
-
Learn More
A New Chapter for Sectigo with GI Partners
Blog Post from Sectigo
Blog Post Sep 16, 2020I am very pleased to announce the exciting news that Sectigo has been acquired by GI Partners, a leading middle-market private investment firm and a first-class organization with whom we have had a strong relationship for several years. During the past two decades, GI Partners has raised more $23 billion in capital from institutional investors globally investing in high growth sectors including data infrastructure.
-
Learn More
What are digital signatures & how do they work?
Blog Post from Sectigo
Blog Post Sep 15, 2020A digital signature is a PKI-based digital certificate that authenticates the identity of the signer and ensures electronically transmitted documents and digital messages have not been forged or tampered with. Digital signatures are similar to physical signatures in the sense that both are unique to the signer, except that in the case of digitally signed documents, a digital signature offers far more security and the assurance of the document’s origin, identity, and integrity. Based on the highest standard of security, digital signatures are legally binding in the United States and many other countries.
-
Learn More
What Is Web Application Firewall (WAF)?
Blog Post from Sectigo
Blog Post Sep 08, 2020Without proper safeguards in place, hackers can deploy malware and injection attacks that could steal sensitive information, damage your online reputation, and ruin your business. A WAF can help protect you.
-
Learn More
What is SCEP (Simple Certificate Enrollment Protocol)?
Blog Post from Sectigo
Blog Post Sep 03, 2020What is SCEP? Learn why Simple Certificate Enrollment Protocol is used, its advantages, components, prerequisites, how to configure & much more.
-
Learn More
Sectigo Named a Machine Identity Management Sample Vendor in Two 2020 Gartner Hype Cycle Reports
Blog Post from Sectigo
Blog Post Sep 03, 2020The massive increase in users remotely accessing corporate networks has underscored the need for effective digital identity management. Still, that increase pales in comparison to the exponential growth of connected devices needing to be secured.