- October 03, 2024
- Debbie Hayes
Advanced vs Qualified Electronic Signatures: Choosing the Right Vendor
How do you know if you are getting the right signing solution for your business? In this blog we illuminate how to choose the right vendor.
How do you know if you are getting the right signing solution for your business? In this blog we illuminate how to choose the right vendor.
The chain of trust is the cornerstone of online communication and transaction, but how does it work, and why is it so important?
Keeping your organization safe starts with your employees, learn how to make sure they’re equipped to understand cyber threats and keep your company secure.
Artificial Intelligence (AI) has become a transformative force across various industries, revolutionizing the way we live and work. From improving…
From 1 September 2023, the new CA/B Forum Baseline Requirements come into effect, are you ready? Read on to learn more
PKI For Businesses: With the progressive evolution of the internet, ensuring the security of businesses' online presence has become an increasingly…
Artificial Intelligence (AI) has become a transformative force across various industries, revolutionizing the way we live and work. From improving healthcare to optimizing transportation, AI's capabilities are awe-inspiring. However, amid the advancements, it is crucial to recognize and comprehend the potential dangers that accompany this powerful technology. This blog sheds light on the importance of understanding AI risks and explores six potential dangers of artificial intelligence.
From 1 September 2023, the new CA/B Forum Baseline Requirements come into effect, are you ready? Read on to learn more
PKI For Businesses: With the progressive evolution of the internet, ensuring the security of businesses' online presence has become an increasingly formidable task, owing to the relentless advancements in cyber threats. While the battle against cyber threats remains ongoing, the risk can be significantly mitigated by incorporating Public Key Infrastructure (PKI) into your business strategy. Now before we dive deeper, let us try to understand the meaning of a Public Key Infrastructure (PKI)?
Discover how GlobalSign’s QSS supports digital signing workflows in a diverse range of industries for compliance and security.
With education increasingly becoming an online affair, institutions need to start securing their online documents. Learn how digital signatures and seals can help.
This World Password Day, we’re taking a look at how password security has evolved, and what steps you can take to keep your accounts secure.
Electronic Signatures and Digital Signatures are terms often used interchangeably but join us as we explore everything you need to know about each type.
Replacing paper-based transactions can positively impact a company’s environmental footprint, read our blog to learn more.
In this article, we’ll look at what a Qualified Electronic Signature (QES) is and when and why you should sign with one.
As the cybersecurity landscape evolves, so do the compliance requirements for businesses across industries. But what are the ones to watch? Let's take a look.
Over the last few years, with the advances in technology, conversations around cybersecurity have intensified. Here are seven emerging trends for 2023.
Digital adoption can play a remarkable role in your business growth journey; but what is it, why is it important and how can help your business? Read more
Phishing is a type of cyberattack which is often deployed by email. But what are the different types of phishing and how can it be prevented?
Need to comply with eIDAS, but not sure which type of signature you need? We explain the difference between advanced and qualified e-signatures to help you decide which is best for you.
GlobalSign conducted a survey earlier this year to better understand how, and why, companies are using Public Key Infrastructure (PKI) based certificates. Nearly 750 people participated in the survey,…
Following the EU Commission’s announcement on 18 April 2019, businesses may or may not be aware the e-invoicing Directive came into force...
In this increasingly hyperconnected world, digital transformation helps improve the productivity of the organization. Technological innovation continues to support organizations in carrying out their…
Workflow Automation never held enough importance ever before. With organizations facing issues, automation has become a need of an hour. Here are some of the top reasons why you need to automate your…
When it comes down to organizational security, we rely on Public Key Infrastructure every time we shop, bank, or fill out official forms. This blog will give you more ideas about how it is…
In this increasingly hyperconnected world, digital transformation helps improve the productivity of the organization. Technological innovation continues to support organizations in carrying out their…
Processing paper documents may require significant physical space, time, resources, and cost. However, you can integrate cost-effective solutions for your document management and get greater control…
Workflow Automation never held enough importance ever before. With organizations facing issues, automation has become a need of an hour. Here are some of the top reasons why you need to automate your…
When it comes down to organizational security, we rely on Public Key Infrastructure every time we shop, bank, or fill out official forms. This blog will give you more ideas about how it is…
Online, the lack of information on which we normally base our trust, as well as the pressure to make a quick decision, leads to frequent errors in judgement. Those errors can be substantial – and…
GlobalSign conducted a survey earlier this year to better understand how, and why, companies are using Public Key Infrastructure (PKI) based certificates. Nearly 750 people participated in the survey,…
Well, it’s that time of year again. The time when cybersecurity’s best and brightest come together in San Francisco to share our latest thoughts, ideas and wares on combating and managing the scourge…
Cryptojacking is the malicious use of a victim’s computer to mine cryptocurrency, and is a growing problem for both individual users and companies. If you’ve never heard of it before, that’s likely…
2018 was a pivotal year for GlobalSign – and the security industry in general. From new partnerships and integrations to expanded capabilities in Europe and significant developments in IoT – the most…
In a world where new attacks happen every day – action must be taken now - regardless of the state of a larger US cybersecurity strategy. No more waiting. Now’s the time.
Some of GlobalSign's favorite employees are asked to gaze into their crystal balls and glean some insight into next year's cybersecurity landscape. What do you expect to see next year?