Redirecting you to

Security Terminology

Easily understandable explanations of common industry terms.

  • Listen Now
    Root Causes - A PKI & Security Podcast

    EPISODE 86

    Broadcast Date:
    April 27, 2020

    18 minutes

    Podcast Apr 27, 2020

    Root Causes 86: SSH Keys

    SSH keys are essential for controlling access to production infrastructure. Our hosts are joined by repeat guest David Colon.

  • Learn More

    COVID-19 Strains Critical Certificate Authority Processes

    A News Article from Sectigo

    News Article Apr 24, 2020

    Certificate authority oversight was complex and arduous prior to COVID-19, but social distancing requirements, quarantines and shelter-in-place orders have made the in-person meetings required to secure and verify digital certificates enormously difficult.

  • Learn More

    Sectigo and Infineon Partner for Greater Security Management

    A News Article from Sectigo

    News Article Apr 24, 2020

    Automated certificate provisioning is made possible by Sectigo IoT Identity manager, combined with Infineon’s OPTIGA TPM for private key storage.

  • Listen Now
    Root Causes - A PKI & Security Podcast

    EPISODE 85

    Broadcast Date:
    April 23, 2020

    17 minutes

    Podcast Apr 23, 2020

    Root Causes 85: Automotive Key Fobs and Cryptography

    Attacks compromising our cars' key fobs could be highly damaging. Join us to learn about the cryptographic architecture of a modern automotive key fob.

  • Learn More

    Don’t ‘Compromise’ Your Code Amid Malware Mayhem

    A Blog Post from Sectigo

    Blog Post Apr 21, 2020

    With EV Code Signing Certificates, the EV vetting process is mandated by the CA/Browser Forum, discouraging fraudsters from attempting to obtain them.

  • Listen Now
    Root Causes - A PKI & Security Podcast

    EPISODE 84

    Broadcast Date:
    April 20, 2020

    9 minutes

    Podcast Apr 20, 2020

    Root Causes 84: What Is DNS over HTTPS?

    In this episode our hosts explain DNS over HTTPS, it potential uses, and how it works.

  • Learn More

    How to Keep Cybercriminals from Attacking Via Our Car Key Fobs

    A News Article from Sectigo

    News Article Apr 18, 2020

    More and more cars are rolling off the lots using key fobs to handle a variety of operations, from simply unlocking the vehicle and remotely starting it to using a button push to have your smart vehicle automatically drive to where you are waiting. These car fobs can be wonderful, and very convenient—until it all goes bad.

  • Blog Post Apr 17, 2020

    Introducing Sectigo Virtual Backgrounds

    COVID-19 has changed almost everyone’s day-to-day lives. We hope that you and all of those you care about are staying healthy.

  • Learn More

    Cybersecurity Expert Comments on Zoom and the Importance of Security

    A News Article from Sectigo

    News Article Apr 16, 2020

    Zoom is making rapid security changes after being banned from a number of high-profile businesses including Siemens, SpaceX and Standard Chartered following high-profile criticism from the InfoSec community. Where does this leave Zoom and what can other businesses learn from its meteoric rise in popularity exposing weaknesses?

  • Learn More

    CTO Talk: Q&A with Sectigo’s Jason Soroko

    A News Article from Sectigo

    News Article Apr 16, 2020

    In this Q&A, the 13th in our weekly series, Jason Soroko explains why it’s important to remember that humans are the ones using technology, talks balancing research and customer meetings and why creating trustworthy electronic interactions “has been among society’s most important initiatives for the past three decades”.

  • Learn More

    Sectigo Partners with Infineon to Protect IoT Devices

    A News Article from Sectigo

    News Article Apr 16, 2020

    Sectigo, a provider of automated digital identity management and web security solutions, announced a partnership with Infineon Technologies AG to provide automated certificate provisioning for Infineon’s OPTIGA Trusted Platform Module (TPM) 2.0 using Sectigo IoT Identity Manager.

  • Learn More

    How to Keep Cyber-Criminals and Cyber-Terrorists from Attacking Via...

    A News Article from Sectigo

    News Article Apr 16, 2020

    An appropriate hardware solution is a first step toward building a secure authentication solution for automotive key fobs. This solution must be paired with an authentication solution that is not easily defeated. Use of asymmetric encryption with certificate-based authentication provides a strong defense against hacking. Certificate-based authentication requires a PKI solution to issue and manage certificates.