- January 07, 2025
- Jaya Mehmie
Code Signing Certificate Validity Changes: What This Means For You
The maximum validity period for Code Signing Certificates is decreasing, but what does this mean for you? Discover more in our blog.
The maximum validity period for Code Signing Certificates is decreasing, but what does this mean for you? Discover more in our blog.
In the fast-paced world of enterprise security the right partner for your digital security needs is non-negotiable. Here’s why you should choose GlobalSign.
Businesses heavily rely on digital certificates, but being crypto-agile is essential to prevent disruptions and respond to threats.
Artificial Intelligence (AI) has become a transformative force across various industries, revolutionizing the way we live and work. From improving…
From 1 September 2023, the new CA/B Forum Baseline Requirements come into effect, are you ready? Read on to learn more
PKI For Businesses: With the progressive evolution of the internet, ensuring the security of businesses' online presence has become an increasingly…
Artificial Intelligence (AI) has become a transformative force across various industries, revolutionizing the way we live and work. From improving healthcare to optimizing transportation, AI's capabilities are awe-inspiring. However, amid the advancements, it is crucial to recognize and comprehend the potential dangers that accompany this powerful technology. This blog sheds light on the importance of understanding AI risks and explores six potential dangers of artificial intelligence.
From 1 September 2023, the new CA/B Forum Baseline Requirements come into effect, are you ready? Read on to learn more
PKI For Businesses: With the progressive evolution of the internet, ensuring the security of businesses' online presence has become an increasingly formidable task, owing to the relentless advancements in cyber threats. While the battle against cyber threats remains ongoing, the risk can be significantly mitigated by incorporating Public Key Infrastructure (PKI) into your business strategy. Now before we dive deeper, let us try to understand the meaning of a Public Key Infrastructure (PKI)?
Protect your website and customers' data with a paid SSL certificate from a trusted CA. Enhance security, boost trust, and improve SEO with strong SSL encryption.
Premium SSL/TLS certificates are cryptographic certificates that protect users' data when they visit your website. They offer numerous value-added benefits like warranty coverage, stronger encryption, trust indicators, and multiple levels of validation that free SSL certificates lack.
Certificate lifecycle management can be daunting, especially if you rely on traditional manual methods, but with certificate automation, you can eliminate inefficiencies and maximise your ROI. Certificate automation refers to the process of streamlining certificate issuance, renewal, revocation, and more.
During the holiday periods, cyber threats are larger than ever – find out how to protect your business while having peace of mind through automated security solutions.
Discover 4 essential practices to enhance your cybersecurity strategy and protect your business from evolving cyber threats.
Keeping your organization safe starts with your employees, learn how to make sure they’re equipped to understand cyber threats and keep your company secure.
This World Password Day, we’re taking a look at how password security has evolved, and what steps you can take to keep your accounts secure.
Multi-factor authentication (MFA) is one of the most simple-yet-effective ways to bolster security. Don’t believe us, here are five reasons why.
In this article, we’ll look at what a Qualified Electronic Signature (QES) is and when and why you should sign with one.
What is Multi-factor Authentication and how can it help control which endpoints can access your networks and resources? Answer this and more
Ransomware is the most common type of cyberattacks on businesses. But what exactly is it and how do you prevent your business from being attacked?
While there are many different steps that can be taken to secure a wireless network, these 12 best practices are essential for ensuring that your data and devices are safe from malicious actors.
Healthcare security breaches accounted for a loss of $6 trillion globally by the end of 2020. Read the top 10 cybersecurity challenges.
The revised Payment Service Directive, most often referred to by its acronym PSD2, officially went into effect in September 2019 – although the European Banking Authority has given companies an…
The California Consumer Protection Act (CCPA) went into effect on January 1, 2020. This article will explain what the CCPA is, who it affects, and why compliance is critical for ALL organizations.
Keep reading to find out more about the latest directive affecting the security industry in the EU. For a quick list of all the abbreviations scroll down to the PSD2 Glossary at the end of the post.
GlobalSign conducted a survey earlier this year to better understand how, and why, companies are using Public Key Infrastructure (PKI) based certificates. Nearly 750 people participated in the survey,…
Hackers. They’re a unique bunch. Naturally, they have decided to take advantage of the Coronavirus. Keep reading to see 3 ways hackers are wreaking havoc and trying to make a buck during this crisis.
Online, the lack of information on which we normally base our trust, as well as the pressure to make a quick decision, leads to frequent errors in judgement. Those errors can be substantial – and…
The revised Payment Service Directive, most often referred to by its acronym PSD2, officially went into effect in September 2019 – although the European Banking Authority has given companies an…
Keep reading to find out more about the latest directive affecting the security industry in the EU. For a quick list of all the abbreviations scroll down to the PSD2 Glossary at the end of the post.
One of the common pitfalls a company might fall into is assuming that its cybersecurity solutions are maintained and managed via standard risk assessments.
GlobalSign conducted a survey earlier this year to better understand how, and why, companies are using Public Key Infrastructure (PKI) based certificates. Nearly 750 people participated in the survey,…
As a freelancer, balancing your need for privacy with your desire to get work can be difficult. Often, so many questions arise: Should you share personal information that can be used to identify you…
It never fails…Every day, workers use the same laptop in the office used at home. Others bring their phones and connect to company Wi-Fi. While it may seem innocuous, this habit can cause profound…
The world is evolving at the speed of light and the emergences of new technological trends are shaping a new future that businesses must be quick to adapt to.
Some of GlobalSign's favorite employees are asked to gaze into their crystal balls and glean some insight into next year's cybersecurity landscape. What do you expect to see next year?
Promote CyberSecurity and CyberSafety in your critical infrastructure! Here's how your organisation can properly prepare against CyberCrime.
Help your executives understand the evolving legal landscape and their compliance obligations related to CyberCrime, CyberSafety, and CyberWarfare.
Automation is all about modifying systems in a way that reduces effort while retaining high accuracy.
On Identity Management Day, we recall the dangers of improperly managing digital identities along with the best practices in Identity that inspire people to act.
What’s in store for 2023? Our experts predict seven (7) emerging trends in Asia-Pacific
In a world where most activities are done digitally, protecting sensitive data is of utmost importance. One of the ways to do this is by verifying identities within the network, done through what we…
Preventing data breaches is key to ensuring your business is protected. With the average cost of a breach increasing, here are 10 key best practices for stopping data breaches before they happen.
Explore seven solutions for cyber security threats in digital banking.
Does certificate-based authentication work the same way as other types of authentications? Find out in this infographic!
Consider adding another layer of security to your network. Here’s a quick guide on everything you need to know about certificate-based authentication.
What is certificate-based authentication and how can it improve your business’ cybersecurity posture? Know the answers and more in this blog.
Passwords are no longer enough to protect users from data breaches and identity thefts. Learn more about authentication, and how your business can benefit from the different types of solutions.
Learn what authentication is, the different types of authentication, and why it is almost a necessity in any network.
For companies that are still implementing WFH operations, here are some solutions to look into to create a secure and resilient work environment.
As a freelancer, balancing your need for privacy with your desire to get work can be difficult. Often, so many questions arise: Should you share personal information that can be used to identify you…