-
News Article Dec 03, 2019
When “devices” are vehicles transporting people at high speeds on roadways, these vulnerabilities become safety risks. Embedded firewalls maximise driver safety and help prevent the loss of intellectual property, disruption of services, and proliferation of an attack to other systems.
-
Podcast Dec 02, 2019
Root Causes 54: 2019 Lookback - Infrastructure and IoT Security
It was an eventful year for infrastructure and IoT security. Join our hosts as they discuss 2019 trends and 2020 predictions for IoT and infrastructure.
-
Blog Post Nov 26, 2019
On Black Friday and Cyber Monday, Look Out for “Not Secure” Warnings
As millions of people visit online retailers to spend their hard-earned money this holiday, cybercriminals will be working to trick consumers into mistakenly sending that money their way, instead. A number of browsers are pioneering new ways for users to recognize that the site they are visiting might not be what it appears. Non-HTTPS pages, or pages without an EV SSL certificate validating them as trustworthy, will be flagged as potentially dangerous sites.
-
Product Video Nov 25, 2019
Digital Certificates in the Modern Enterprise
Our solutions make scaling and automating your digital identity management system possible, providing you the crypto-agility to future-proof your systems.
-
Blog Post Nov 25, 2019
[This guest post originally ran on Let’s Encrypt’s blog on Nov 20, 2019.] Let’s Encrypt launched a Certificate Transparency (CT) log this past spring. We’re excited to share how we built it in hopes that others can learn from what we did. . . Sectigo and Amazon Web Services generously provided support to cover a significant portion of the cost of running our CT log.
-
Podcast Nov 25, 2019
Root Causes 53: 2019 Lookback - Governments Try to Control PKI
It's been an eventful year for PKI. In this episode our hosts discuss how governments sought to control encryption, certificates, and public trust in 2019.
-
Podcast Nov 22, 2019
Root Causes 52: New TLS Certificate Incident Research
Indiana University Bloomington recently published public SSL research, including methodology, incident types and causes, and rogue certificates.
-
Blog Post Nov 20, 2019
Australia's IoT Cybersecurity Guidelines for Embedded Device Security
Australia has joined the ever-swelling ranks of government and industry organizations developing guidelines or enacting regulations regarding IoT device security. On Nov. 11, 2019, the country published their “Draft Code of Practice: Securing the Internet of Things for Consumers,” which outlines 13 security practices intended to apply to all IoT devices available in Australia.
-
Podcast Nov 19, 2019
Root Causes 51: Blockchain vs PKI
Join us as we explain the details of how blockchain and PKI work, similarities and differences between them, and what use cases are appropriate for each.
-
Datasheet Nov 18, 2019
Discover Sectigo's Certificate Management platform that gives you the power to deploy and automate the management of digital certificates.
-
Datasheet Nov 18, 2019
To enable secure authentication and prevent counterfeiting, OEMs and manufacturers add certificates to their IoT devices and chips at the assembly line.
-
News Article Nov 18, 2019
Recently, the U.S. has been exploring the idea of banning end-to-end encryption (E2EE). Sectigo CEO Bill Holtz explains in his latest Forbes Technology Council column why technologists must remain vigilant against the erosion of security and attempts to weaken encryption—and why E2EE is not going anywhere.