-
Blog Post Dec 04, 2019
Five Ways PKI Protects and Secures Financial Services Data
Data has become the lifeblood of the financial services industry. From managing transaction details and providing real-time account and trading information to automating risk management processes, forecasting, and fraud detection, data is integral and the most important resource to protect.
-
Watch Now
44 minutes
Webinar Dec 03, 2019California Consumer Protection Act: What You Need to Know
CCPA has created consumer privacy protections for all California residents. Our experts explain these new regulations and their implications.
-
Watch Now
45 minutes
Webinar Dec 03, 2019Unleashing Speed and Scale in DevSecOps
Join Sectigo and Forrester for a discussion about DevOps growth in the enterprise, the challenges organizations face with compliance, and more!
-
Press Release Dec 03, 2019
Sectigo to Host DevSecOps Webinar Featuring Forrester on December 6th
Development teams are moving faster. Container lifetimes continue to shorten, while usage explodes. Meanwhile, software and web app vulnerabilities are the leading cause of external breaches – and containers are just as vulnerable. Sectigo and Forrester will guide DevOps teams in improving security, reliability, interoperability, and compliance, while eliminating worry about downtime.
-
Learn More
Connected Cars Need Stronger Identity for Safer Streets
News Article from Sectigo
News Article Dec 03, 2019When “devices” are vehicles transporting people at high speeds on roadways, these vulnerabilities become safety risks. Embedded firewalls maximise driver safety and help prevent the loss of intellectual property, disruption of services, and proliferation of an attack to other systems.
-
Learn More
141 Cybersecurity Predictions for 2020
News Article from Sectigo
News Article Dec 03, 2019Sectigo's CEO, Bill Holtz, and Senior Fellow, Tim Callan, share predictions about automation and quantum computing in Forbes' annual collection of cybersecurity predictions by industry experts.
-
Listen Now
EPISODE 54
Broadcast Date:
December 2, 201925 minutes
Podcast Dec 02, 2019Root Causes 54: 2019 Lookback - Infrastructure and IoT Security
It was an eventful year for infrastructure and IoT security. Join our hosts as they discuss 2019 trends and 2020 predictions for IoT and infrastructure.
-
Blog Post Nov 26, 2019
On Black Friday and Cyber Monday, Look Out for “Not Secure” Warnings
As millions of people visit online retailers to spend their hard-earned money this holiday, cybercriminals will be working to trick consumers into mistakenly sending that money their way, instead. A number of browsers are pioneering new ways for users to recognize that the site they are visiting might not be what it appears. Non-HTTPS pages, or pages without an EV SSL certificate validating them as trustworthy, will be flagged as potentially dangerous sites.
-
Watch Now
3 minutes
Product Video Nov 25, 2019Digital Certificates in the Modern Enterprise
Our solutions make scaling and automating your digital identity management system possible, providing you the crypto-agility to future-proof your systems.
-
Learn More
How Let's Encrypt Runs CT Logs
Blog Post from Sectigo
Blog Post Nov 25, 2019[This guest post originally ran on Let’s Encrypt’s blog on Nov 20, 2019.] Let’s Encrypt launched a Certificate Transparency (CT) log this past spring. We’re excited to share how we built it in hopes that others can learn from what we did. . . Sectigo and Amazon Web Services generously provided support to cover a significant portion of the cost of running our CT log.
-
Listen Now
EPISODE 53
Broadcast Date:
November 25, 201919 minutes
Podcast Nov 25, 2019Root Causes 53: 2019 Lookback - Governments Try to Control PKI
It's been an eventful year for PKI. In this episode our hosts discuss how governments sought to control encryption, certificates, and public trust in 2019.
-
Listen Now
EPISODE 52
Broadcast Date:
November 22, 201924 minutes
Podcast Nov 22, 2019Root Causes 52: New TLS Certificate Incident Research
Indiana University Bloomington recently published public SSL research, including methodology, incident types and causes, and rogue certificates.