-
Webinar Mar 19, 2024
Q1 2024 Pulse
Join us for our Sectigo Pulse webinar, where we cover the latest product and compliance news and how these events might impact you and your business.
-
Podcast Mar 19, 2024
Root Causes 370: Drama on Bugzilla
An evolving incident on Bugzilla has garnered a lot of attention and touches several important issues in the WebPKI ecosystem.
-
Podcast Mar 15, 2024
Root Causes 369: IMessage to Be PQC Enabled
Apple has announced that iMessage will employ post-quantum cryptography (PQC). We explain the implications of this announcement.
-
Podcast Mar 13, 2024
Root Causes 368: CRYSTALS-Kyber Is Now ML-KEM
CRYSTALS-Kyber now has the new official name of Module Lattice-based Key Encryption Module, or ML-KEM. We give an update on the NIST round 3 winners.
-
Podcast Mar 07, 2024
Root Causes 367: Did an IoT Toothbrush Botnet Perform DDoS Attacks?
A story circulated earlier this year about a botnet composed of millions of IoT toothbrushes, which later was debunked. We tell you the whole tale.
-
Podcast Mar 04, 2024
Root Causes 366: What Is eIDAS?
eIDAS 2.0 has been making headlines recently with its proposed expansion to the European digital identity ecosystem. What is eIDAS, and why does it exist?
-
Blog Post Feb 29, 2024
Explore Certificate Lifecycle Management (CLM) for cybersecurity. Consider TCO, including purchase, maintenance, labor costs for informed decisions.
-
Blog Post Feb 29, 2024
Prioritize cyber hygiene for robust security. Automate practices, stay quantum-ready, and collaborate for resilience.
-
Podcast Feb 26, 2024
Root Causes 365: What Is Subdomain Hijacking?
In this episode we explain subdomain hijacking, including dangling subdomains and how they can constitute vulnerabilities.
-
Podcast Feb 22, 2024
Root Causes 364: Video Conference Deepfake Enables $25 Million Theft
Deepfakes continue to show themselves as part of the criminal toolkit. A recent deepfake spear phish enabled a $25 million Business Email Compromise (BEC).
-
Podcast Feb 19, 2024
Root Causes 363: Defending Yourself Against Use of Stolen Priveleges
We discuss the steps enterprises can take to protect themselves against malicious use of stolen access credentials.
-
Blog Post Feb 16, 2024
Addressing IT skills gap: automate with Certificate Lifecycle Management (CLM). Streamlining tasks, innovating, reducing manual updates.