Redirecting you to

Resource Library

Looking for something? Search or browse our extensive library of resources

Start typing to search tags.

Advanced Filters

Filter by Tag

Clear Selection

Filter by Date Range

  • Register Now

    REGISTER

    A live webinar hosted by Sectigo.

    60 minutes

    Webinar Upcoming

    The use cases of private and public CAs

    Join our webinar to explore public vs. private CAs, their use cases, key selection factors, and the risks of choosing the wrong one.

  • Learn More

    Subdomain hijacking: risks & prevention tips

    Blog Post from Sectigo

    Blog Post Upcoming

    Attackers hijack abandoned subdomains to run phishing scams. Prevent this by auditing DNS records, removing outdated entries, and enforcing cloud security.

  • Watch Now

    6 minutes

    Product Video Mar 31, 2025

    How to add notifications and notification templates

    Set up SCM email notifications for SSL status, scans & more. Customize templates for tailored alerts.

  • Watch Now

    4 minutes

    Product Video Mar 31, 2025

    How to create and customize certificate profiles

    Learn how SCM admins create, customize, and delegate certificate profiles for secure certificate management.

  • Listen Now
    Root Causes - A PKI & Security Podcast

    EPISODE 481

    Broadcast Date:
    March 31, 2025

    12 minutes

    Podcast Mar 31, 2025

    Root Causes 481: What Is Protocol Ossification?

    Protocol ossification is the phenomenon whereby ecosystems fail to work correctly with the full range of options included in a protocol. This occurs when individual software components only partially support the capabilities that should be available. We define protocol ossification, explain how and why it occurs, give real world examples, and talk about potential remedies.

  • Listen Now
    Root Causes - A PKI & Security Podcast

    EPISODE 473

    Broadcast Date:
    March 28, 2025

    10 minutes

    Podcast Mar 28, 2025

    Root Causes 473: Does Security Software Lack Creativity?

    Jason reports on a 2024 Black Hat keynote about how modern software development practices inhibit innovation and invention.

  • Learn More

    Sectigo wins 2025 Cybersecurity Excellence Award for Certificate Lifecycle Management; Continues leadership in G2 Spring 2025 Grid Reports

    Press Release from Sectigo

    Press Release Mar 28, 2025

    SCOTTSDALE, Ariz., — March 28, 2025 — Sectigo, a global leader in digital certificates and automated Certificate Lifecycle Management (CLM), today announced a series of industry awards received over the past month. Among these accolades, Sectigo’s flagship product, Sectigo Certificate Manager (SCM), was distinguished as the winner of the Certificate Lifecycle Management category in the 2025 Cybersecurity Excellence Awards. Additionally, Sectigo earned seven badges in the G2 Spring 2025 Reports, a quarterly customer review-driven awards program.

  • Learn More

    What is Signal, the app at center of White House security breach?

    News Article from Sectigo

    News Article Mar 26, 2025

    NBC Bay Area business and tech reporter Scott Budman breaks down what to know about Signal, the messaging app where a journalist says he was accidentally texted details of a planned United States attack by the country's top defense officials.

  • Learn More

    Quantum Threats Are Closer Than You Think

    News Article from Sectigo

    News Article Mar 26, 2025

    he era of commercially available quantum computers capable of compromising today’s cryptography may not be fully upon us yet, but it is coming on faster than many believe. It is crucial for organizations to consider quantum threats now, not after they become a present danger. The coming of the quantum era has troubling implications for cybersecurity, especially if it is not adequately prepared for in the intervening years.

  • Learn More

    The Looming Quantum Threat: NCSC Urges Encryption Upgrades

    News Article from Sectigo

    News Article Mar 24, 2025

    The danger to cryptography posed by next-generation large-scale, fault-tolerant quantum computers is widely understood. Although current encryption methods, which are used to secure everything from banking to communications, are based on mathematical algorithms that the everyday PC is unable to crack, a new era of incredibly fast quantum computers is just a few years away, poised to revolutionize problem-solving, communication, and computation.

  • Listen Now
    Root Causes - A PKI & Security Podcast

    EPISODE 479

    Broadcast Date:
    March 21, 2025

    13 minutes

    Podcast Mar 21, 2025

    Root Causes 479: AI Adversarial Machine Learning

    In this episode we discuss the thinking on how adversaries can exploit the flaws in AI models to achieve unexpected and dangerous results. We explore some potential paths of defense against attacks of this sort.

  • Learn More

    Deprecation of client authentication EKU from Sectigo SSL/TLS certs

    Notification from Sectigo

    Notification Mar 20, 2025

    Sectigo is removing the Client Authentication Extended Key Usage (EKU) from newly issued publicly trusted SSL/TLS certificates. This change aligns with updated industry requirements and best practices to enhance the security and purpose specificity of digital certificates.