- October 03, 2024
- Debbie Hayes
Advanced vs Qualified Electronic Signatures: Choosing the Right Vendor
How do you know if you are getting the right signing solution for your business? In this blog we illuminate how to choose the right vendor.
How do you know if you are getting the right signing solution for your business? In this blog we illuminate how to choose the right vendor.
The chain of trust is the cornerstone of online communication and transaction, but how does it work, and why is it so important?
Keeping your organization safe starts with your employees, learn how to make sure they’re equipped to understand cyber threats and keep your company secure.
Artificial Intelligence (AI) has become a transformative force across various industries, revolutionizing the way we live and work. From improving…
From 1 September 2023, the new CA/B Forum Baseline Requirements come into effect, are you ready? Read on to learn more
PKI For Businesses: With the progressive evolution of the internet, ensuring the security of businesses' online presence has become an increasingly…
Artificial Intelligence (AI) has become a transformative force across various industries, revolutionizing the way we live and work. From improving healthcare to optimizing transportation, AI's capabilities are awe-inspiring. However, amid the advancements, it is crucial to recognize and comprehend the potential dangers that accompany this powerful technology. This blog sheds light on the importance of understanding AI risks and explores six potential dangers of artificial intelligence.
From 1 September 2023, the new CA/B Forum Baseline Requirements come into effect, are you ready? Read on to learn more
PKI For Businesses: With the progressive evolution of the internet, ensuring the security of businesses' online presence has become an increasingly formidable task, owing to the relentless advancements in cyber threats. While the battle against cyber threats remains ongoing, the risk can be significantly mitigated by incorporating Public Key Infrastructure (PKI) into your business strategy. Now before we dive deeper, let us try to understand the meaning of a Public Key Infrastructure (PKI)?
Keeping your organization safe starts with your employees, learn how to make sure they’re equipped to understand cyber threats and keep your company secure.
This World Password Day, we’re taking a look at how password security has evolved, and what steps you can take to keep your accounts secure.
Multi-factor authentication (MFA) is one of the most simple-yet-effective ways to bolster security. Don’t believe us, here are five reasons why.
In this article, we’ll look at what a Qualified Electronic Signature (QES) is and when and why you should sign with one.
What is Multi-factor Authentication and how can it help control which endpoints can access your networks and resources? Answer this and more
Ransomware is the most common type of cyberattacks on businesses. But what exactly is it and how do you prevent your business from being attacked?
While there are many different steps that can be taken to secure a wireless network, these 12 best practices are essential for ensuring that your data and devices are safe from malicious actors.
Healthcare security breaches accounted for a loss of $6 trillion globally by the end of 2020. Read the top 10 cybersecurity challenges.
The revised Payment Service Directive, most often referred to by its acronym PSD2, officially went into effect in September 2019 – although the European Banking Authority has given companies an…
The California Consumer Protection Act (CCPA) went into effect on January 1, 2020. This article will explain what the CCPA is, who it affects, and why compliance is critical for ALL organizations.
Keep reading to find out more about the latest directive affecting the security industry in the EU. For a quick list of all the abbreviations scroll down to the PSD2 Glossary at the end of the post.
GlobalSign conducted a survey earlier this year to better understand how, and why, companies are using Public Key Infrastructure (PKI) based certificates. Nearly 750 people participated in the survey,…
Hackers. They’re a unique bunch. Naturally, they have decided to take advantage of the Coronavirus. Keep reading to see 3 ways hackers are wreaking havoc and trying to make a buck during this crisis.
Online, the lack of information on which we normally base our trust, as well as the pressure to make a quick decision, leads to frequent errors in judgement. Those errors can be substantial – and…
The revised Payment Service Directive, most often referred to by its acronym PSD2, officially went into effect in September 2019 – although the European Banking Authority has given companies an…
Keep reading to find out more about the latest directive affecting the security industry in the EU. For a quick list of all the abbreviations scroll down to the PSD2 Glossary at the end of the post.
One of the common pitfalls a company might fall into is assuming that its cybersecurity solutions are maintained and managed via standard risk assessments.
GlobalSign conducted a survey earlier this year to better understand how, and why, companies are using Public Key Infrastructure (PKI) based certificates. Nearly 750 people participated in the survey,…
As a freelancer, balancing your need for privacy with your desire to get work can be difficult. Often, so many questions arise: Should you share personal information that can be used to identify you…
It never fails…Every day, workers use the same laptop in the office used at home. Others bring their phones and connect to company Wi-Fi. While it may seem innocuous, this habit can cause profound…
The world is evolving at the speed of light and the emergences of new technological trends are shaping a new future that businesses must be quick to adapt to.
Some of GlobalSign's favorite employees are asked to gaze into their crystal balls and glean some insight into next year's cybersecurity landscape. What do you expect to see next year?