Redirecting you to

Security Terminology

Easily understandable explanations of common industry terms.

  • Learn More

    AI concerns | What are 'deepfakes', and how could they impact your workforce?

    News Article from Sectigo

    News Article Nov 20, 2023

    Nick France, CTO of Sectigo, says that this could have an impact on voice and face recognition employees currently use to authenticate themselves.

  • Learn More

    How Can I Manage Certificates From Multiple Public CAs?

    Blog Post from Sectigo

    Blog Post Nov 20, 2023

    Should you purchase all your digital certificates from one Certificate Authority (CA) or get them from different ones?

    Let's explore the pros and cons of using multiple CAs and how a robust, CA-agnostic Certificate Lifecycle Management (CLM) platform allows you to enjoy the benefits that several different CAs provide.

  • Learn More

    What Is a Credential Vault?

    Blog Post from Sectigo

    Blog Post Nov 17, 2023

    Most organizations face increasingly complex IT environments with growing numbers of security credentials. This often hampers IT efficiency and poses increasing risks of intrusion and data breach. Plus, ensuring everything complies with the latest policy and compliance requirements is time-consuming and labor-intensive.

  • Listen Now
    Root Causes - A PKI & Security Podcast

    EPISODE 342

    Broadcast Date:
    November 17, 2023

    11 minutes

    Podcast Nov 17, 2023

    Root Causes 342: Don't Change Your Password for Two Years

    The CA/Browser Forum rules stipulate how often forced password changes for CA employees are to occur. They set a MINIMUM time. Join us to learn why.

  • Watch Now

    60 minutes

    Webinar Nov 16, 2023

    How to build a crypto-agile security organization

    Join our webinar to learn what it takes to be truly crypto-agile and the benefits it brings to an organization.

  • Learn More

    The Significance of Vendor Consolidation

    Blog Post from Sectigo

    Blog Post Nov 14, 2023

    Organizations worldwide are increasingly focusing on vendor consolidation as an essential strategy to harness the full potential of automation, digital certificates, and digital security. By streamlining vendor relationships, organizations can achieve enhanced efficiency, improved security, reduced complexity, and in some cases substantial cost savings. However, time constraints and switching costs can present large barriers to integrating platforms, and when consolidating businesses need to make sure there aren’t gaps in security coverage.

  • Learn More

    ‘Hi Mum, it’s me’: how online scammers learnt to prey on our emotions

    News Article from Sectigo

    News Article Nov 13, 2023

    “In the next five years,” says France, “AI is only going to increase the sophistication of this kind of deepfake scams, making the technology more democratised, easier to perform and more accurate to the persona they are mimicking.”

  • Learn More

    Domain Control Validation (DCV) Methods & How to Choose

    Blog Post from Sectigo

    Blog Post Nov 13, 2023

    Secure Sockets Layer/Transport Layer Security (SSL / TLS) certificates are the gold standard in securing online data exchange. But how can you be sure that the website you share your sensitive information with is indeed who they say they are?

  • Listen Now
    Root Causes - A PKI & Security Podcast

    EPISODE 341

    Broadcast Date:
    November 13, 2023

    19 minutes

    Podcast Nov 13, 2023

    Root Causes 341: The Trouble with Security Questionnaires

    The practice of sending security questionnaires to technology vendors is exploding, and with it dysfunctional behavior is on the rise.

  • Learn More

    Top 8 Weaknesses in Multi-Factor Authentication (MFA)

    Blog Post from Sectigo

    Blog Post Nov 10, 2023

    Multi-factor Authentication (MFA) is a security principle that requires multiple authentication factors before granting users access to a system. For example, a user may have to submit a username, a password, and a security code texted to their phone before they can connect to a web application.

  • Learn More

    What is crypto-agility and how to achieve it

    Blog Post from Sectigo

    Blog Post Nov 09, 2023

    Today's organizations must achieve crypto-agility, which enables them to switch out cryptographic components whenever necessary instead of being locked into a specific cryptographic method. 

    This article explores what crypto-agility entails, why it's important, how it supports cybersecurity, and how to achieve crypto-agility. Plus, we'll discuss where certificate agility fits in and how you can protect your organizations against threats from quantum computing, which may soon make current cryptographic components ineffective.

  • Learn More

    Sectigo enables EU customers to retain data sovereignty in the cloud

    News Article from Sectigo

    News Article Nov 09, 2023

    Sectigo has launched its EU Cloud Platform, marking a significant enhancement to Sectigo’s flagship Certificate Lifecycle Management solution, Sectigo Certificate Manager (SCM).

    The launch of Sectigo’s European Cloud Platform provides EU-based Certificate Manager customers access to EU-hosted, cloud-based private PKI, allowing them to maintain data sovereignty and providing increased peace of mind as regulators seek to help EU companies maintain control of their corporate data.