-
Blog Post Oct 12, 2023
Most of the time, the terms “secure” and “safe” can be used interchangeably. You’re never going to get hung up on whether a bank tells you’re your money is “secure” or “safe” within its vault. But when it comes to your personal information on the internet, understanding the distinction between those two words can mean the difference between effectively protecting yourself and having your identity compromised.
-
Webinar Oct 12, 2023
Q4 2023 Pulse Webinar
Join us for our quarterly Pulse webinar, where we'll cover the latest product and compliance news and how these events might impact you and your business.
-
Podcast Oct 10, 2023
Root Causes 337: CLM and the IT Skills Gap
In this episode we discuss how Certificate Lifecycle Management and certificate automation can help mitigate the challenges posed by the IT skills gap.
-
Blog Post Oct 03, 2023
CAs are trusted organizations that store, sign and issue SSL certificates for websites. Learn more about how Certificate Authorities work with Sectigo.
-
Blog Post Oct 03, 2023
Public key infrastructure (PKI) relies on two different cryptographic keys, a public key and a private key, to encrypt and decrypt data. These complex algorithms use mathematical formulas to generate digital certificates with unique digital identities to secure information.
-
Podcast Oct 03, 2023
Root Causes 336: Digitally Signing Images on Cameras
A recent press release discusses efforts of camera manufacturers and the digital imagery supply chain to create an ecosystem for digitally signed images.
-
Podcast Sep 29, 2023
Root Causes 335: When MFA Is Not MFA
A social engineering attack to steal a one-time password (OTP) to enable unauthorized access is further exploited by a cloud backup feature.
-
Webinar Sep 28, 2023
Why effective certificate management relies on enhanced discovery
Certificate discovery is the most important pillar of CLM. Without it you simply cannot effectively manage and automate the other steps.
-
Podcast Sep 27, 2023
Root Causes 334: What Is Attestation on the Web?
Most people hate dealing with CAPTCHA, but it offers benefits for web sites. We discuss alternatives to CAPTCHA, how they work, and their pros and cons.
-
Podcast Sep 21, 2023
Root Causes 333: Intel Side Channel Attack Steals Private Keys
A newly revealed side channel attack can capture AES encryption keys from Intel chips. We explain this significant and powerful attack.
-
Podcast Sep 14, 2023
Root Causes 332: Acoustic AI-based Key Logging Attack
An AI model that can interpret keystrokes based on the sound of keyboard use over a phone or video call and steal passwords.
-
Podcast Sep 13, 2023
Root Causes 331: Microsoft Restores Trust to Code Signing Root
Recent erroneous behavior on Windows indicates that Microsoft removed - and then re-added - a legacy VeriSign root in its trusted roots list.