-
Podcast Oct 31, 2023
Root Causes 339: The ROI of CLM
In this episode we describe at a high level how to calculate the TCO of CLM as opposed to manual installation and management of certificates.
-
Podcast Oct 23, 2023
Root Causes 338: CLM and Your Career as an IT Professional
In this follow up to our episode on CLM and the IT skills gap, we now discuss how CLM matters to individual IT professionals' careers and work life.
-
News Article Oct 16, 2023
Christopher Bray, senior vice-president of partner and e-commerce sales at Sectigo, is just as blunt. “Not in the least bit,” he says. “I think a company in our space can only scale so far on their own, and I’m certain our focus on expanding our channel ecosystem will drive strong growth and scale.”
-
Whitepaper Oct 16, 2023
We are pleased to share this brand new report for a limited time, where Gartner lists Sectigo as a vendor that can solve IoT authentication use cases.
-
Blog Post Oct 12, 2023
What is a certificate signing request (CSR)? Learn about the meaning of this request for SSL/TLS certificates & how to generate one on different platforms.
-
Blog Post Oct 12, 2023
Most of the time, the terms “secure” and “safe” can be used interchangeably. You’re never going to get hung up on whether a bank tells you’re your money is “secure” or “safe” within its vault. But when it comes to your personal information on the internet, understanding the distinction between those two words can mean the difference between effectively protecting yourself and having your identity compromised.
-
Webinar Oct 12, 2023
Q4 2023 Pulse Webinar
Join us for our quarterly Pulse webinar, where we'll cover the latest product and compliance news and how these events might impact you and your business.
-
Podcast Oct 10, 2023
Root Causes 337: CLM and the IT Skills Gap
In this episode we discuss how Certificate Lifecycle Management and certificate automation can help mitigate the challenges posed by the IT skills gap.
-
Blog Post Oct 03, 2023
CAs are trusted organizations that store, sign and issue SSL certificates for websites. Learn more about how Certificate Authorities work with Sectigo.
-
Blog Post Oct 03, 2023
Public key infrastructure (PKI) relies on two different cryptographic keys, a public key and a private key, to encrypt and decrypt data. These complex algorithms use mathematical formulas to generate digital certificates with unique digital identities to secure information.
-
Podcast Oct 03, 2023
Root Causes 336: Digitally Signing Images on Cameras
A recent press release discusses efforts of camera manufacturers and the digital imagery supply chain to create an ecosystem for digitally signed images.
-
Podcast Sep 29, 2023
Root Causes 335: When MFA Is Not MFA
A social engineering attack to steal a one-time password (OTP) to enable unauthorized access is further exploited by a cloud backup feature.