-
Blog Post Oct 12, 2020
Cybercriminals continue to find new, sneaky ways of attacking users. Why? Because it’s lucrative. The more successful attacks they can execute, the more money they can make.
-
Blog Post Oct 09, 2020
Website security should be the top priority for any online business. Keeping your website safe and clean ensures that you are operating at full effectiveness – and your users and their data are safe from hackers and malicious bots.
-
Datasheet Oct 09, 2020
Enterprises need a reliable and scalable certificate management solution to ensure critical application delivery appliances are protected without timeconsuming administrative tasks or the risk of unexpected certificate expirations or outages. Sectigo’s integration for Citrix ADC eliminates the complexity of manually installing and managing certificates across remote ADC appliances at scale.
-
Blog Post Oct 08, 2020
Yes, you can get a virus just from visiting a website.
These days, it’s very easy to be overconfident in our abilities to avoid computer viruses. After all, many of us were told that we simply had to avoid files and programs we didn’t recognize. If an email came through that looked fishy, we didn’t open them.
-
Podcast Oct 08, 2020
Root Causes 125: Digital Identity Versus IAM
Certificate-based digital identity and Identity and Access Management (IAM) platforms are entirely different things. How do they fit in with each other?
-
Blog Post Oct 07, 2020
You’ve heard the term “blacklist” used many times, but what does it really mean?
-
Blog Post Oct 07, 2020
October is upon us, and that means the beginning of another Cybersecurity Awareness Month. To say that 2020 has been an interesting year would be a vast understatement, and cybersecurity professionals have had to face down new and unexpected challenges like the widespread shift to remote work amid the COVID-19 pandemic.
-
Podcast Oct 05, 2020
Root Causes 124: Biometric MFA
We explore biometric MFA, including strengths and weaknesses and the idea that biometrics are more about proof of possession than identity authentication.
-
Whitepaper Oct 02, 2020
Download this whitepaper to learn about how S/MIME certificates can protect your enterprise and employees from sophisticated attacks from hackers.
-
Datasheet Oct 02, 2020
Many enterprises now operate their own Private Certificate Authority (CA) to provide tighter control of authentication using Public Key Infrastructure (PKI) certificates that serve that organization only. To ensure the Private CA protects the entire network environment, IT teams need a solution that: Covers all types of certificates used across the enterprise, supports an architecture with any combination of root CA and issuing CA from private and 3rd party authorities, enables issuance, deployment, renewal, and replacement of certificates quickly, reliably, and scalably. Download to learn more about how our Certificate Manager Private CA feature can cut costs, save time, and enhance security. This fully automated feature adheres to corporate and industry compliance standards.
-
Blog Post Oct 01, 2020
Malware left unaddressed for too long can cause customers to distrust you, kill your revenues, and damage your reputation in the industry.
If you see the signs of malware on your site, then you need to act fast to get rid of it before its impact is magnified.
-
News Article Oct 01, 2020
Jason Soroko at Sectigo explains how the Quantum Apocalypse threatens to destroy common encryption techniques and how organisations around the world are developing new quantum-safe crypto algorithms.