Redirecting you to

Blog Posts

Get expert insights and explore the latest trends in digital trust, public key infrastructure (PKI), certificate lifecycle management (CLM), web security, and postquantum cryptography.

Subscribe
Start typing to search tags.

Advanced Filters

Filter by Tag

Clear Selection

Filter by Date Range

  • Learn More

    Can you get a virus from visiting a website?

    Blog Post from Sectigo

    Blog Post Oct 08, 2020

    Visiting websites can spread viruses via exploit kits and vulnerabilities. Update software & use tools like SiteLock for protection.

  • Learn More

    What Is Blacklisting, and How Does It Impact a Website?

    Blog Post from Sectigo

    Blog Post Oct 07, 2020

    You’ve heard the term “blacklist” used many times, but what does it really mean?

  • Learn More

    Tips to Remember During Cybersecurity Awareness Month

    Blog Post from Sectigo

    Blog Post Oct 07, 2020

    October is upon us, and that means the beginning of another Cybersecurity Awareness Month. To say that 2020 has been an interesting year would be a vast understatement, and cybersecurity professionals have had to face down new and unexpected challenges like the widespread shift to remote work amid the COVID-19 pandemic.

  • Learn More

    How to Get Rid of Malware

    Blog Post from Sectigo

    Blog Post Oct 01, 2020

    Malware left unaddressed for too long can cause customers to distrust you, kill your revenues, and damage your reputation in the industry.

    If you see the signs of malware on your site, then you need to act fast to get rid of it before its impact is magnified.

  • Learn More

    What Is an SSH Key?

    Blog Post from Sectigo

    Blog Post Sep 24, 2020

    SSH keys not only improve security but also enable the automation of connected processes, single sign-on (SSO), and identity and access management at scale that today’s businesses require.

  • Learn More

    Sectigo’s 2020 Mission ‘Possible’: Business Continuity

    Blog Post from Sectigo

    Blog Post Sep 24, 2020

    To say that the year 2020 has forced businesses to face unprecedented challenges would be an understatement. Amid a global pandemic, uncertainty has become the norm and businesses are tackling real questions about what the future may hold for remote work, growth, and profitability.

  • Learn More

    Understanding SQL Injection Attacks

    Blog Post from Sectigo

    Blog Post Sep 16, 2020

    SQL injection attacks are one of the oldest, most prevalent, and most dangerous vulnerabilities. It is often listed as the number one threat to web security.

  • Learn More

    A New Chapter for Sectigo with GI Partners

    Blog Post from Sectigo

    Blog Post Sep 16, 2020

    I am very pleased to announce the exciting news that Sectigo has been acquired by GI Partners, a leading middle-market private investment firm and a first-class organization with whom we have had a strong relationship for several years. During the past two decades, GI Partners has raised more $23 billion in capital from institutional investors globally investing in high growth sectors including data infrastructure.

  • Learn More

    What are digital signatures & how do they work?

    Blog Post from Sectigo

    Blog Post Sep 15, 2020

    A digital signature is a PKI-based digital certificate that authenticates the identity of the signer and ensures electronically transmitted documents and digital messages have not been forged or tampered with. Digital signatures are similar to physical signatures in the sense that both are unique to the signer, except that in the case of digitally signed documents, a digital signature offers far more security and the assurance of the document’s origin, identity, and integrity. Based on the highest standard of security, digital signatures are legally binding in the United States and many other countries.

  • Learn More

    What Is Web Application Firewall (WAF)?

    Blog Post from Sectigo

    Blog Post Sep 08, 2020

    Without proper safeguards in place, hackers can deploy malware and injection attacks that could steal sensitive information, damage your online reputation, and ruin your business. A WAF can help protect you.

  • Learn More

    What is SCEP (Simple Certificate Enrollment Protocol)?

    Blog Post from Sectigo

    Blog Post Sep 03, 2020

    What is SCEP? Learn why Simple Certificate Enrollment Protocol is used, its advantages, components, prerequisites, how to configure & much more.

  • Learn More

    Sectigo Named a Machine Identity Management Sample Vendor in Two 2020 Gartner Hype Cycle Reports

    Blog Post from Sectigo

    Blog Post Sep 03, 2020

    The massive increase in users remotely accessing corporate networks has underscored the need for effective digital identity management. Still, that increase pales in comparison to the exponential growth of connected devices needing to be secured.