- October 03, 2024
- Debbie Hayes
Advanced vs Qualified Electronic Signatures: Choosing the Right Vendor
How do you know if you are getting the right signing solution for your business? In this blog we illuminate how to choose the right vendor.
How do you know if you are getting the right signing solution for your business? In this blog we illuminate how to choose the right vendor.
The chain of trust is the cornerstone of online communication and transaction, but how does it work, and why is it so important?
Keeping your organization safe starts with your employees, learn how to make sure they’re equipped to understand cyber threats and keep your company secure.
Artificial Intelligence (AI) has become a transformative force across various industries, revolutionizing the way we live and work. From improving…
From 1 September 2023, the new CA/B Forum Baseline Requirements come into effect, are you ready? Read on to learn more
PKI For Businesses: With the progressive evolution of the internet, ensuring the security of businesses' online presence has become an increasingly…
Artificial Intelligence (AI) has become a transformative force across various industries, revolutionizing the way we live and work. From improving healthcare to optimizing transportation, AI's capabilities are awe-inspiring. However, amid the advancements, it is crucial to recognize and comprehend the potential dangers that accompany this powerful technology. This blog sheds light on the importance of understanding AI risks and explores six potential dangers of artificial intelligence.
From 1 September 2023, the new CA/B Forum Baseline Requirements come into effect, are you ready? Read on to learn more
PKI For Businesses: With the progressive evolution of the internet, ensuring the security of businesses' online presence has become an increasingly formidable task, owing to the relentless advancements in cyber threats. While the battle against cyber threats remains ongoing, the risk can be significantly mitigated by incorporating Public Key Infrastructure (PKI) into your business strategy. Now before we dive deeper, let us try to understand the meaning of a Public Key Infrastructure (PKI)?
Just how popular are smart homes? By 2025, the number of smart homes in the world is expected to be 478.2 million. But using devices connected to the Internet of Things (IoT) can be a double-edged…
Smart Cities, made possible by the rapid advancement of connected devices, software systems and information communications technologies are helping in the urbanization
We share an infographic on the history of the Industrial Internet of Things Cyber Attacks and tips on how to secure the IIoT and strengthen your business.
Every business aims to become more efficient and agile, especially as the pace of digital transformation is accelerating. Streamlining business processes and workflows is an efficient and durable way…
Internet of Things (IoT) devices are becoming ubiquitous while IoT services are becoming pervasive. Their success has not gone unnoticed, and the number of threats and attacks against IoT devices and…
Every business aims to become more efficient and agile, especially as the pace of digital transformation is accelerating. Streamlining business processes and workflows is an efficient and durable way…
Internet of Things (IoT) devices are becoming ubiquitous while IoT services are becoming pervasive. Their success has not gone unnoticed, and the number of threats and attacks against IoT devices and…
IoT security from chip to cloud just got a lot more secure and far easier to attain. And that’s great news for IoT device manufacturers, operators and system integrators.
This has been another busy year for hackers. As for what we can expect in 2020, only time will tell. In the meantime, we’ve asked some of GlobalSign’s brightest minds to share their thoughts.
According to research from Markets and Markets, the artificial intelligence industry is expected to grow to $190 billion by 2025. By the year 2021, it is estimated that three-quarters of commercial…
We like to laugh at scams. Once exposed, security risks that fooled thousands turn into stories of “Who could have fallen for that?”
These ransomware attacks may have funny names, but the consequences are no laughing matter.
Smart Cities, made possible by the rapid advancement of connected devices, software systems and information communications technologies are helping in the urbanization...
At the show, GlobalSign’s Technology Partner Manager, Mike Boyle, and Sebastian Schultz, Sales Engineer will take a look into PKI and the need for Crypto Agility...
Strong, unique identities are the core of IoT device security. Giving unique identities allows them to be authenticated when they come online and throughout the lifetime. It proves integrity and…
We’ve all heard of consumer IoT device breaches leading to unnerving situations and events. But when breaches happen to industrially connected IoT devices and systems, the consequences are…
Predictions aren't easy, especially in the chaotic world of cybersecurity. The threat landscape is ever-growing, all thanks to offensive and defensive technologies and nation-state attacks emerging at…
2018 was a pivotal year for GlobalSign – and the security industry in general. From new partnerships and integrations to expanded capabilities in Europe and significant developments in IoT – the most…
Mike James will take a look at how well British Airways handled their data breach, including whether they acted in accordance with the rules of the GPDR, and what the potential outcome could be.
Some of GlobalSign's favorite employees are asked to gaze into their crystal balls and glean some insight into next year's cybersecurity landscape. What do you expect to see next year?