Redirecting you to

Blog Posts

Get expert insights and explore the latest trends in digital trust, public key infrastructure (PKI), certificate lifecycle management (CLM), web security, and postquantum cryptography.

Subscribe
Start typing to search tags.

Advanced Filters

Filter by Tag

Clear Selection

Filter by Date Range

  • Learn More

    How Can a Person Inject a Malicious Script Into a Website?

    Blog Post from Sectigo

    Blog Post Sep 03, 2020

    Understanding how a website is attacked by a malicious script is helpful to either prevent this from happening to your site in the future or solve the problem if your site has already been hacked.

  • Learn More

    IT World Awards Name Jason Soroko CTO of the Year—Security Software

    Blog Post from Sectigo

    Blog Post Sep 01, 2020

    Congratulations Jason! Network Products Guide has published its 2020 IT World Awards winners and Sectigo’s own CTO of PKI, Jason Soroko, was named the Gold Winner in the category Chief Technology Officer of the Year: Security Software.

  • Learn More

    How a DDoS attack works & how to prevent them

    Blog Post from Sectigo

    Blog Post Sep 01, 2020

    Distributed Denial of Service (DDoS) attacks can cause a lot of damage. Learn how DDoS attacks work, common types and how to prevent them on your site.

  • Learn More

    ACME protocol for easy PKI certificate automation

    Blog Post from Sectigo

    Blog Post Aug 27, 2020

    ACME automates PKI certificate management, simplifying issuance, renewal, and revocation for secure, scalable IT infrastructure.

  • Learn More

    We Are Sectigo | Ashwadeep Vaishnav

    Blog Post from Sectigo

    Blog Post Aug 27, 2020

    Ashwadeep (Ash) Vaishnav begins each day with the same goal in mind: to make sure Sectigo customers are happy.

  • Learn More

    Definition of malware & the different types that exist

    Blog Post from Sectigo

    Blog Post Aug 05, 2020

    As the personal computer gained popularity hackers had a field day overloading unsuspecting users’ machines with viruses, bugs, and damaging programs.

  • Learn More

    Quantum-Safe Crypto—Surviving the Quantum Cryptographic Apocalypse

    Blog Post from Sectigo

    Blog Post Aug 04, 2020

    The fundamental cryptographic algorithms now used to protect every facet of digital life will, within several years, be defeated by quantum computers.

  • Learn More

    What is an SSL certificate & how does it work

    Blog Post from Sectigo

    Blog Post Jul 30, 2020

    Learn how SSL certificates secure websites, their types, benefits like trust and SEO, and simple steps to install and use them effectively.

  • Learn More

    SSL certificates explained

    Blog Post from Sectigo

    Blog Post Jul 30, 2020

    Learn about the different types of SSL certificates: extended validated (EV), organization validated (OV) and domain validated (DV). See use cases, variations, and more.

  • Blog Post Jul 23, 2020

    We Are Sectigo | Patrick Harris

    By keeping a close eye on industry trends and actively listening to customers’ needs, the Sectigo sales team is at the forefront of innovation discussions.

  • Learn More

    Steps for Migrating PKI-Based Security to Quantum-Safe Cryptography

    Blog Post from Sectigo

    Blog Post Jul 16, 2020

    Migrating to quantum-safe crypto algorithms requires planning and updates to multiple systems. Here are the 6 steps needed for direct or hybrid migration.

  • Learn More

    All About Quantum-Safe Certificates for Next-Generation Cybersecurity

    Blog Post from Sectigo

    Blog Post Jul 08, 2020

    How to Choose Between Traditional, Quantum-Safe, Hybrid, and Composite Certificates