![Why Automated Identity Management Is a Game-Changer](/application/files/3617/1695/9215/automated-identity-hero-image.webp)
- June 20, 2024
- Zhong Han Chua
Why Automated Identity Management Is a Game-Changer
All modern businesses have an online presence, which means that it is crucial to maintain and protect digital identities to establish trust and…
All modern businesses have an online presence, which means that it is crucial to maintain and protect digital identities to establish trust and…
For decades, SSL/TLS (Secure Sockets Layer/Transport Layer Security) certificates have been the foundation for maintaining online trust, preventing…
Digital identity certification is an essential asset for businesses that need to maintain online trust and protect their data from fraudulent…
Want to browse the internet safely without being tracked? Here’s how you can keep your digital footprints safe and secure in this era of mass surveillance.
Fix common name mismatch or SSL certificate with wrong hostname error in few easy steps.
Looking for a managed service provider? Finding a tech company that will make a strategic partnership can be difficult when so many companies claim to be the best. David Gaudio shares these helpful…
Trust is essential for any company but especially for those that rely on online sales. Trust indicators, such as seals, can make all the difference between someone choosing to do business with you vs…
Need to comply with eIDAS, but not sure which type of signature you need? We explain the difference between advanced and qualified e-signatures to help you decide which is best for you.
So what is the difference between AATL and CDS when digitally signing documents? If you have come across the terms and are confused about which one you need, read this blog.
What is a man-in-the-middle cyber-attack and how can you prevent an MITM attack in your own business. This blog explores some of the tactics you can use to keep your organization safe.
Learn how to run your own simulated phishing test and reduce the risk of social engineering attacks on your organization. We show you examples of how GlobalSign do it.
What is S/MIME or secure email certificates and how do they help protect your organization? If you are new to email encryption and signing, this is the perfect place to start.
We answer the questions: what is timestamping, what is trusted timestamping and how timestamping works? We also look at common transactions where timestamping would be used.
Guest blogger, Denver Prophit Jr, gives a quick start guide to HSTS. What is HSTS and HSTS preloading, how do you use it and how to implement it on various servers.
GlobalSign will be attending RSA Conference at the Moscone Center in San Francisco. We have a lot of exciting developments to show you, check out the schedule here.
CASC's new Code Signing Certificate requirements are setting a standard for code signing. Are you ready? Learn what these minimal requirements will mean for developers.
A Distributed Denial of Service Attack (DDoS) is, unfortunately, an increasingly common form of premeditated attack against an organization’s web infrastructure. Typically, it involves using…
Internal server names and reserved IPs are not allowed in public SSL/TLS Certificates. Learn why and your solution options.