Redirecting you to

Security Terminology

Easily understandable explanations of common industry terms.

  • Learn More

    CryptoChameleon Phishing Scam Targets Crypto Users and FCC Employees

    News Article from Sectigo

    News Article Mar 06, 2024

    So far, the CryptoChameleon phishing scam has successfully phished over 100 victims, with many still active.

    Lookout has discovered a multi-pronged phishing campaign, dubbed “CryptoChameleon,” that mimics legitimate login pages for cryptocurrency platforms and the Federal Communications Commission (FCC) via mobile devices.

  • Learn More

    NIST Unveils Cybersecurity Framework 2.0 with Key Upgrades

    News Article from Sectigo

    News Article Mar 06, 2024

    The U.S. National Institute of Standards and Technology (NIST) has released version 2.0 of its landmark Cybersecurity Framework (CSF), a comprehensive update aimed at helping organizations better manage and reduce cybersecurity risks across all sectors and sizes.

  • Learn More

    SMB cybersecurity best practices for 2024

    Blog Post from Sectigo

    Blog Post Mar 05, 2024

    Small businesses face constant cyber threats. To safeguard, adopt a layered, automated cybersecurity approach. Explore resources & best practices in 2024.

  • Learn More

    CryptoChameleon Attackers Target Apple, Okta Users With Tech Support Gambit

    News Article from Sectigo

    News Article Mar 05, 2024

    A phishing kit dubbed CryptoChameleon has been discovered targeting cryptocurrency platforms, including employees of Binance and Coinbase — as well as the Federal Communications Commission (FCC).

  • Listen Now
    Root Causes - A PKI & Security Podcast

    EPISODE 366

    Broadcast Date:
    March 4, 2024

    27 minutes

    Podcast Mar 04, 2024

    Root Causes 366: What Is eIDAS?

    eIDAS 2.0 has been making headlines recently with its proposed expansion to the European digital identity ecosystem. What is eIDAS, and why does it exist?

  • Learn More

    Industry Reactions to NIST Cybersecurity Framework 2.0: Feedback Friday

    News Article from Sectigo

    News Article Mar 01, 2024

    NIST this week announced the release of version 2.0 of its Cybersecurity Framework (CSF). This is the first major update to the CSF since its creation a decade ago.

    The cybersecurity framework was originally created for critical infrastructure organizations, but CSF 2.0 is designed to help all organizations reduce risks, regardless of sector, size, or level of security sophistication.

  • Learn More

    CISA warns that malicious actors are targeting cloud infrastructure

    News Article from Sectigo

    News Article Feb 29, 2024

    The Cybersecurity & Infrastructure Security Agency (CISA) recently announced that cyberattackers are evolving techniques to gain initial cloud access. The advisory discusses the recent adjustments made by the group APT29, also known as the Dukes, Cozy Bear or Midnight Blizzard.

  • Learn More

    Total cost of ownership for an SSL/TLS certificate manager platform

    Blog Post from Sectigo

    Blog Post Feb 29, 2024

    Explore Certificate Lifecycle Management (CLM) for cybersecurity. Consider TCO, including purchase, maintenance, labor costs for informed decisions.

  • Learn More

    What is cyber hygiene and why businesses should know about it

    Blog Post from Sectigo

    Blog Post Feb 29, 2024

    Prioritize cyber hygiene for robust security. Automate practices, stay quantum-ready, and collaborate for resilience.

  • Learn More

    NIST Releases Cybersecurity Framework 2.0: Guide for All Organizations

    News Article from Sectigo

    News Article Feb 28, 2024

    NIST’s Applied Cybersecurity Division has updated its framework to better suit the needs of a wider range of users, reflecting recent cybersecurity challenges and management practices.


  • Learn More

    CISA: APT29 targeting cloud accounts for initial access

    News Article from Sectigo

    News Article Feb 27, 2024

    CISA warned that a notorious threat group associated with the Russian Foreign Intelligence Services is increasingly targeting cloud services to gain initial access to victim organizations in the government, healthcare and education sectors.


  • Listen Now
    Root Causes - A PKI & Security Podcast

    EPISODE 365

    Broadcast Date:
    February 26, 2024

    14 minutes

    Podcast Feb 26, 2024

    Root Causes 365: What Is Subdomain Hijacking?

    In this episode we explain subdomain hijacking, including dangling subdomains and how they can constitute vulnerabilities.