-
News Article May 28, 2024
GitHub Issues Patch for Critical Exploit in Enterprise Server
-
Podcast May 28, 2024
Root Causes 389: 2024 RSA Conference Wrap Up
Jason and Tim do their annual RSA wrap-up. Trending segments include AI, Trust Centers, MFA, PQC, and more.
-
News Article May 23, 2024
Sectigo’s new North America channel leader says a massive opportunity is on the horizon for Sectigo partners due to a Google Chrome proposed policy change.
-
Press Release May 22, 2024
SCOTTSDALE, Ariz., — May 22, 2024 — Sectigo®, the industry’s most innovative provider of comprehensive certificate lifecycle management (CLM), and Computer Gross, the Italian leader in value-based distribution, have announced a distribution agreement.
-
Podcast May 22, 2024
Root Causes 388: What Is the WebPKI?
These days we frequently discuss "the WebPKI." But what does that really mean? In this episode we define WebPKI and how it has evolved over time.
-
Webinar May 22, 2024
Bugzilla – the real issue of missed revocations
March and April 2024 have seen more than 25 new Bugzilla bugs being written up – more than 10 times the typical pace.
-
Podcast May 16, 2024
Root Causes 387: What Is the Post-quantum Readiness of HSMs?
We take a deep dive with return guest Bruno Coulliard on HSMs and the role they play in post-quantum cryptography (PQC).
-
News Article May 15, 2024
Many organizations that have implemented passwordless authentication via the FIDO2 standard may be undermining some of the security benefits of the approach by not properly securing the sessions that take place after authentication happens.
-
Press Release May 14, 2024
SCOTTSDALE, Ariz., — May 14, 2024 — Sectigo®, the industry’s most innovative provider of comprehensive certificate lifecycle management (CLM), today announced it has been honored with three awards from three leading cybersecurity publications. The recognition comes as the company prosecutes a new strategy to democratize the management of digital certificates critical for all.
-
News Article May 14, 2024
With the rise of powerful chatbots and deceptive deepfake content, experts believe AI could be used to influence elections and it is unclear if governments or tech giants can deal with the threat.
-
News Article May 14, 2024
The Investigatory Powers Act (IPA) of 2016 was tasked with combining various existing powers used by law enforcement and security agencies for communication data collection and interception.
-
News Article May 13, 2024
Kaspersky researchers have identified multiple security vulnerabilities in Cinterion cellular modems, which could potentially be exploited by threat actors to access sensitive information and execute arbitrary code.