-
Podcast Jul 08, 2021
Root Causes 171: The Off-by-One-Second Problem
We explore an error in public certificates that we call the off-by-one-second problem. We explain this problem and its broader implications.
-
Blog Post Jul 07, 2021
Self-signed certificates are free and quick to create but risky for public use. Best suited for internal testing, not secure for sensitive data.
-
Blog Post Jul 07, 2021
Today's modern enterprises must secure their data and applications that run and are hosted in the cloud using Amazon Web Services (AWS). Digital certificates based on public key infrastructure (PKI), such as SSL/TLS certificates and code signing certificates, are the gold standard for authentication and encryption of data and applications in the cloud. But organizations that use AWS have a choice of certificate authorities (CAs) that can issue certificates. This article helps you understand the differences between Public CA certificates and those provided by Amazon.
-
Blog Post Jun 22, 2021
Expired or misconfigured SSL/TLS certificates can cause many issues. Learn how to avoid SSL outages and how to renew certificates with Sectigo.
-
Blog Post Jun 22, 2021
Electronically signing a document authenticates the signer, so all recipients can verify that the contents have not been modified since it was signed. Microsoft Word, one of the world's most popular word-processing platforms, is used consistently by individuals and organizations to create important documents.
-
Podcast Jun 08, 2021
Root Causes 166: The Trouble with OU Fields
Of all aspects of public SSL certificates, few are as controversial as the OU field. Our hosts explain why this field is an industry flashpoint.
-
Blog Post Apr 08, 2021
Public key infrastructure (PKI) manages identity and security within Internet communications to protect people, devices, and data.
-
Blog Post Apr 07, 2021
Digital identity management automation has never been more important. Learn about how it works and the benefits it can bring.
-
Podcast Mar 11, 2021
Root Causes 155: Good for Subscribers Is Good for Relying Parties
We explore the relationship between Relying Parties and Certificate Subscribers and the downstream impact of needless certificate incidents and rules.
-
Podcast Jan 29, 2021
Root Causes 145: Google Chrome to Distrust CA Camerfirma
Google has announced distrust for Spanish public CA Camerfirma in Chrome build 90. We explain the reasons for (and implications of) this decision.
-
Podcast Jan 18, 2021
Root Causes 142: Removing Street and Postal Code from Public Certs
On March 1 Sectigo will remove street address and postal/zip code information from its public certificates of all types. Our hosts explain why.
-
Notification Jan 11, 2021
As of March 1, 2021 Sectigo will remove street address and zip/postal code information from all public certificates.