Redirecting you to

Blog Posts

Get expert insights and explore the latest trends in digital trust, public key infrastructure (PKI), certificate lifecycle management (CLM), web security, and postquantum cryptography.

Subscribe
Start typing to search tags.

Advanced Filters

Filter by Tag

Clear Selection

Filter by Date Range

  • Learn More

    TLS/SSL handshake errors & how to fix them

    Blog Post from Sectigo

    Blog Post Nov 23, 2023

    Transport Layer Security (TLS), also called Secure Sockets Layer (SSL), is a security protocol that encrypts data exchanged between two points on the internet (e.g., a web server and a browser). It also authenticates a website's identity.

  • Learn More

    Cybersecurity Tips to Help CISOs Prepare for Holiday Time Off

    Blog Post from Sectigo

    Blog Post Nov 22, 2023

    Organizations experience 30% more ransomware attacks during the holiday season, with a 70% average increase in attempted ransomware attacks in November and December compared with January and February. Many factors converge to make defending our infrastructures more challenging, such as increased online transactions and a shortage of IT resources as employees go on vacations.

  • Learn More

    Why Are Code Signing Certificates Shipped on Tokens?

    Blog Post from Sectigo

    Blog Post Nov 22, 2023

    How can a user be sure software has not been tampered with during the distribution process? We need a verification process Code Signing enhances trust and prevents the spread of malware and are proven to be reliable and sure over decades of widespread use. However, did you know about the recent standards update that added a hardware token requirement? Here's how a token can help you improve security.

  • Learn More

    How Can I Manage Certificates From Multiple Public CAs?

    Blog Post from Sectigo

    Blog Post Nov 20, 2023

    Should you purchase all your digital certificates from one Certificate Authority (CA) or get them from different ones?

    Let's explore the pros and cons of using multiple CAs and how a robust, CA-agnostic Certificate Lifecycle Management (CLM) platform allows you to enjoy the benefits that several different CAs provide.

  • Learn More

    What Is a Credential Vault?

    Blog Post from Sectigo

    Blog Post Nov 17, 2023

    Most organizations face increasingly complex IT environments with growing numbers of security credentials. This often hampers IT efficiency and poses increasing risks of intrusion and data breach. Plus, ensuring everything complies with the latest policy and compliance requirements is time-consuming and labor-intensive.

  • Learn More

    The Significance of Vendor Consolidation

    Blog Post from Sectigo

    Blog Post Nov 14, 2023

    Organizations worldwide are increasingly focusing on vendor consolidation as an essential strategy to harness the full potential of automation, digital certificates, and digital security. By streamlining vendor relationships, organizations can achieve enhanced efficiency, improved security, reduced complexity, and in some cases substantial cost savings. However, time constraints and switching costs can present large barriers to integrating platforms, and when consolidating businesses need to make sure there aren’t gaps in security coverage.

  • Learn More

    Domain Control Validation (DCV): Methods & Best Practices

    Blog Post from Sectigo

    Blog Post Nov 13, 2023

    Learn how Domain Control Validation (DCV) works, explore key validation methods, and find the right approach for securing your SSL/TLS certificate.

  • Learn More

    Top 8 Weaknesses in MFA & How to Fix Them

    Blog Post from Sectigo

    Blog Post Nov 10, 2023

    MFA has weaknesses like phishing and social engineering. Learn how certificate-based authentication and CLM mitigate risks and strengthen security.

  • Learn More

    What is crypto-agility and how to achieve it

    Blog Post from Sectigo

    Blog Post Nov 09, 2023

    Crypto-agility lets systems adapt cryptographic methods rapidly, ensuring security amid evolving threats. Achieve it with robust management practices.

  • Learn More

    Certificate Signing Request Guide: Secure Your Website

    Blog Post from Sectigo

    Blog Post Oct 12, 2023

    What is a certificate signing request (CSR)? Learn about the meaning of this request for SSL/TLS certificates & how to generate one on different platforms.

  • Learn More

    The Difference Between “Secure” and “Safe” Is Bigger Than You Might Think

    Blog Post from Sectigo

    Blog Post Oct 12, 2023

    Most of the time, the terms “secure” and “safe” can be used interchangeably. You’re never going to get hung up on whether a bank tells you’re your money is “secure” or “safe” within its vault. But when it comes to your personal information on the internet, understanding the distinction between those two words can mean the difference between effectively protecting yourself and having your identity compromised.

  • Learn More

    Certificate Authorities: Essential Guide to Digital Trust & Security

    Blog Post from Sectigo

    Blog Post Oct 03, 2023

    CAs are trusted organizations that store, sign and issue SSL certificates for websites. Learn more about how Certificate Authorities work with Sectigo.