Redirecting you to

Resource Library

Looking for something? Search or browse our extensive library of resources.

Start typing to search tags.

Advanced Filters

Filter by Tag

Clear Selection

Filter by Date Range

  • Watch Now

    REGISTER

    A live webinar hosted by Sectigo.

    60 minutes

    Webinar Mar 19, 2024

    Q1 2024 Pulse

    Join us for our Sectigo Pulse webinar, where we cover the latest product and compliance news and how these events might impact you and your business.

  • Learn More

    Don't Let Cybercriminals Bust Your March Madness Bracket

    A News Article from Sectigo

    News Article Mar 18, 2024

    March Madness starts with Selection Sunday this weekend and the official beginning of the NCAA tournament takes place next Tuesday, March 19.

    March Madness is one of the largest, most watched, and anticipated, sporting events every year here in the US. What makes it most intriguing is that it's the only major sporting event in the US that traditionally falls during our business day and those who participate in viewing, and playing in their "office pools", are susceptible to a variety of security threats.

  • Learn More

    Akamai offers POC and Open Policy Agent to block Kubernetes bug

    A News Article from Sectigo

    News Article Mar 15, 2024

    Akamai has offered security teams a proof-of-concept YAML file and Open Policy Agent rule for blocking a high-severity vulnerability in Kubernetes that was originally patched late last year.

    Akamai researcher Tomer Peled said in a March 13 blog post that the vulnerability — CVE-2023-5528 — allows remote code execution with System privileges on all Windows endpoints within a Kubernetes cluster. Peled said to exploit this flaw, the attacker needs to apply malicious YAML files on the Kubernetes cluster — a move that can lead to full takeover on all Windows nodes in a cluster.

  • Listen Now
    Root Causes - A PKI & Security Podcast

    EPISODE 369

    Broadcast Date:
    March 15, 2024

    15 minutes

    Podcast Mar 15, 2024

    Root Causes 369: IMessage to Be PQC Enabled

    Apple has announced that iMessage will employ post-quantum cryptography (PQC). We explain the implications of this announcement.

  • Learn More

    What is the purpose of post-quantum cryptography?

    A Blog Post from Sectigo

    Blog Post Mar 14, 2024

    Quantum computing advances pose security risks. Post-quantum cryptography offers defense. Explore its implications and implementation.

  • Learn More

    Comparably Selects Sectigo for 2024 Best Places to Work Awards

    A Press Release from Sectigo

    Press Release Mar 14, 2024

    SCOTTSDALE, Ariz., — March 14, 2024 — Sectigo®, the industry’s most innovative provider of comprehensive certificate lifecycle management (CLM), announced today that it has been recognized once again as a best place to work, this time by winning the Comparably Best Company Outlook and Best HR Teams awards. The company was similarly honored in December when it captured the top spot for best CEOs, best company culture, best company for women, and best company for diversity.

  • Learn More

    Proliferation of digital identities: increase in digital certificates

    A Blog Post from Sectigo

    Blog Post Mar 13, 2024

    Secure digital identities with trust. Use digital certificates efficiently. Embrace automated lifecycle management for operational ease.

  • Listen Now
    Root Causes - A PKI & Security Podcast

    EPISODE 368

    Broadcast Date:
    March 13, 2024

    9 minutes

    Podcast Mar 13, 2024

    Root Causes 368: CRYSTALS-Kyber Is Now ML-KEM

    CRYSTALS-Kyber now has the new official name of Module Lattice-based Key Encryption Module, or ML-KEM. We give an update on the NIST round 3 winners.

  • Learn More

    New Vcurms Malware Targets Popular Browsers for Data Theft

    A News Article from Sectigo

    News Article Mar 12, 2024

    Cybersecurity researchers at Fortinet’s FortiGuard Labs have discovered a new threat called Vcurms malware targeting popular browsers and apps for login and data theft. They urge security updates and caution with emails.

  • Learn More

    Microsoft: Russian Hackers Gained Access to Source Code Repositories During January Attack

    A News Article from Sectigo

    News Article Mar 12, 2024

    An update from Microsoft on the January attack by Russian hackers indicates that it was more damaging than originally reported, with the Midnight Blizzard group accessing “some” of the company’s internal systems and source code.

  • Learn More

    The Gately Report: AI Provides Massive Opportunity for Check Point Partners

    A News Article from Sectigo

    News Article Mar 11, 2024

    In January, we reported that Nobelium aka Midnight Blizzard, the Russian nation-state hacking group behind the massive SolarWinds attack, targeted Microsoft, compromising a small number of email accounts, including those belonging to senior staff.

  • Learn More

    Russian Hackers Gained Access to Microsoft Source Code, Customer Secrets

    A News Article from Sectigo

    News Article Mar 11, 2024

    In a sobering update released March 8th, Microsoft has revealed that the Russian state-sponsored hacking group Midnight Blizzard, also tracked as Nobelium, has gained unauthorized access to some of the company's source code repositories and internal systems. This follows an initial breach of Microsoft's corporate email systems detected in January 2024.