-
Podcast Nov 13, 2023
Root Causes 341: The Trouble with Security Questionnaires
The practice of sending security questionnaires to technology vendors is exploding, and with it dysfunctional behavior is on the rise.
-
Blog Post Nov 10, 2023
Multi-factor Authentication (MFA) is a security principle that requires multiple authentication factors before granting users access to a system. For example, a user may have to submit a username, a password, and a security code texted to their phone before they can connect to a web application.
-
Blog Post Nov 09, 2023
Today's organizations must achieve crypto-agility, which enables them to switch out cryptographic components whenever necessary instead of being locked into a specific cryptographic method.
This article explores what crypto-agility entails, why it's important, how it supports cybersecurity, and how to achieve crypto-agility. Plus, we'll discuss where certificate agility fits in and how you can protect your organizations against threats from quantum computing, which may soon make current cryptographic components ineffective.
-
Podcast Nov 06, 2023
Root Causes 340: Is This Podcast Canadian Enough?
Canada's Online Streaming Act will require internet content providers to provide a minimum percentage of content produced by Canadians or face fines.
-
Podcast Oct 31, 2023
Root Causes 339: The ROI of CLM
In this episode we describe at a high level how to calculate the TCO of CLM as opposed to manual installation and management of certificates.
-
Podcast Oct 23, 2023
Root Causes 338: CLM and Your Career as an IT Professional
In this follow up to our episode on CLM and the IT skills gap, we now discuss how CLM matters to individual IT professionals' careers and work life.
-
Blog Post Oct 12, 2023
Most of the time, the terms “secure” and “safe” can be used interchangeably. You’re never going to get hung up on whether a bank tells you’re your money is “secure” or “safe” within its vault. But when it comes to your personal information on the internet, understanding the distinction between those two words can mean the difference between effectively protecting yourself and having your identity compromised.
-
Webinar Oct 12, 2023
Q4 2023 Pulse Webinar
Join us for our quarterly Pulse webinar, where we'll cover the latest product and compliance news and how these events might impact you and your business.
-
Podcast Oct 10, 2023
Root Causes 337: CLM and the IT Skills Gap
In this episode we discuss how Certificate Lifecycle Management and certificate automation can help mitigate the challenges posed by the IT skills gap.
-
Blog Post Oct 03, 2023
CAs are trusted organizations that store, sign and issue SSL certificates for websites. Learn more about how Certificate Authorities work with Sectigo.
-
Blog Post Oct 03, 2023
Public key infrastructure (PKI) relies on two different cryptographic keys, a public key and a private key, to encrypt and decrypt data. These complex algorithms use mathematical formulas to generate digital certificates with unique digital identities to secure information.
-
Podcast Oct 03, 2023
Root Causes 336: Digitally Signing Images on Cameras
A recent press release discusses efforts of camera manufacturers and the digital imagery supply chain to create an ecosystem for digitally signed images.