- January 07, 2025
- Jaya Mehmie
Code Signing Certificate Validity Changes: What This Means For You
The maximum validity period for Code Signing Certificates is decreasing, but what does this mean for you? Discover more in our blog.
The maximum validity period for Code Signing Certificates is decreasing, but what does this mean for you? Discover more in our blog.
In the fast-paced world of enterprise security the right partner for your digital security needs is non-negotiable. Here’s why you should choose GlobalSign.
Businesses heavily rely on digital certificates, but being crypto-agile is essential to prevent disruptions and respond to threats.
Artificial Intelligence (AI) has become a transformative force across various industries, revolutionizing the way we live and work. From improving…
From 1 September 2023, the new CA/B Forum Baseline Requirements come into effect, are you ready? Read on to learn more
PKI For Businesses: With the progressive evolution of the internet, ensuring the security of businesses' online presence has become an increasingly…
Artificial Intelligence (AI) has become a transformative force across various industries, revolutionizing the way we live and work. From improving healthcare to optimizing transportation, AI's capabilities are awe-inspiring. However, amid the advancements, it is crucial to recognize and comprehend the potential dangers that accompany this powerful technology. This blog sheds light on the importance of understanding AI risks and explores six potential dangers of artificial intelligence.
From 1 September 2023, the new CA/B Forum Baseline Requirements come into effect, are you ready? Read on to learn more
PKI For Businesses: With the progressive evolution of the internet, ensuring the security of businesses' online presence has become an increasingly formidable task, owing to the relentless advancements in cyber threats. While the battle against cyber threats remains ongoing, the risk can be significantly mitigated by incorporating Public Key Infrastructure (PKI) into your business strategy. Now before we dive deeper, let us try to understand the meaning of a Public Key Infrastructure (PKI)?
Protect your website and customers' data with a paid SSL certificate from a trusted CA. Enhance security, boost trust, and improve SEO with strong SSL encryption.
Premium SSL/TLS certificates are cryptographic certificates that protect users' data when they visit your website. They offer numerous value-added benefits like warranty coverage, stronger encryption, trust indicators, and multiple levels of validation that free SSL certificates lack.
Certificate lifecycle management can be daunting, especially if you rely on traditional manual methods, but with certificate automation, you can eliminate inefficiencies and maximise your ROI. Certificate automation refers to the process of streamlining certificate issuance, renewal, revocation, and more.
Explore how IoT network security begins with secure device enrolment and how industry leaders must prioritize IoT security.
As we wrap up 2024, it’s time to look forward into 2025 and see what to expect from the PKI industry in the coming year.
Advanced architectural models for certificate protection are emerging that are designed to safeguard IoT device identities against supply chain threats.
Smart home IoT is rapidly increasing, and so too is the need for tighter security measures of these devices. Read on to discover more.
It has been over 3 years since the pandemic accelerated technological developments and sparked new uses for pre-existing IoT technology. We take a look at how this has continued to evolve in the…
The Internet of Things (IoT) technology has made our lives more efficient in every aspect, but with this comes risk. In this article, we take a look at the security protocols to help secure IoT…
In this blog, we take a look at 3 common challenges that face IoT security.
Industrial IoT has become very attractive targets to cyber criminals, but how can you mitigate IIoT security challenges with PKI solutions? Discover how in this blog.
Industrial IoT (IIoT) is evolving and defining Industry 4.0, but what are the benefits of reinforcing devices with strong security? We explore this and more.
A brief introduction to the Cybersecurity Improvement Act, best practices and IoT adoption in the US Government.
Let’s take a look at the common cyber-attacks which take place in the Internet of Things (IoT).
The Internet of Things (IoT) is becoming increasingly essential in terms of assisting with product development and enhancements. It can also deliver significant benefits within the manufacturing…
The number of vulnerabilities to IoT devices is increasing. This article explores how protecting IoT devices can be more secure and make the internet safer.
Every industry is now at constant risk of a data breach, or criminals accessing their network and taking control of their systems and the healthcare industry is no exception. Here are 6 medical…
Over the last few years, with the advances in technology, conversations around cybersecurity have intensified. Here are seven emerging trends for 2023.
Explore how IoT network security begins with secure device enrolment and how industry leaders must prioritize IoT security.
Every business aims to become more efficient and agile, especially as the pace of digital transformation is accelerating. Streamlining business processes and workflows is an efficient and durable way…
Internet of Things (IoT) devices are becoming ubiquitous while IoT services are becoming pervasive. Their success has not gone unnoticed, and the number of threats and attacks against IoT devices and…
Explore how IoT network security begins with secure device enrolment and how industry leaders must prioritize IoT security.
Every business aims to become more efficient and agile, especially as the pace of digital transformation is accelerating. Streamlining business processes and workflows is an efficient and durable way…
Internet of Things (IoT) devices are becoming ubiquitous while IoT services are becoming pervasive. Their success has not gone unnoticed, and the number of threats and attacks against IoT devices and…
IoT security from chip to cloud just got a lot more secure and far easier to attain. And that’s great news for IoT device manufacturers, operators and system integrators.
This has been another busy year for hackers. As for what we can expect in 2020, only time will tell. In the meantime, we’ve asked some of GlobalSign’s brightest minds to share their thoughts.
According to research from Markets and Markets, the artificial intelligence industry is expected to grow to $190 billion by 2025. By the year 2021, it is estimated that three-quarters of commercial…
We like to laugh at scams. Once exposed, security risks that fooled thousands turn into stories of “Who could have fallen for that?”
These ransomware attacks may have funny names, but the consequences are no laughing matter.
Smart Cities, made possible by the rapid advancement of connected devices, software systems and information communications technologies are helping in the urbanization...
At the show, GlobalSign’s Technology Partner Manager, Mike Boyle, and Sebastian Schultz, Sales Engineer will take a look into PKI and the need for Crypto Agility...
Strong, unique identities are the core of IoT device security. Giving unique identities allows them to be authenticated when they come online and throughout the lifetime. It proves integrity and…
We’ve all heard of consumer IoT device breaches leading to unnerving situations and events. But when breaches happen to industrially connected IoT devices and systems, the consequences are…
Predictions aren't easy, especially in the chaotic world of cybersecurity. The threat landscape is ever-growing, all thanks to offensive and defensive technologies and nation-state attacks emerging at…
2018 was a pivotal year for GlobalSign – and the security industry in general. From new partnerships and integrations to expanded capabilities in Europe and significant developments in IoT – the most…
Mike James will take a look at how well British Airways handled their data breach, including whether they acted in accordance with the rules of the GPDR, and what the potential outcome could be.
How did the Internet evolve since its inception? What were the developments of PKI throughout the years that changed the way we communicate? All this and more in this blog.
Learn the basics of the Internet of Things (IoT), advantages and disadvantages, how PKI plays an important role in IoT security, and more in this blog.
The GlobalSign IoT Solutions Group is announcing the launch of an IoT developer portal designed specifically to assist IoT developers with device identity integrations.
The continuous rise of technology comes with pros and cons; New Zealand released its cybersecurity strategy to adapt to these changes and avoid any risks.
Site seals increase the level of trust among website visitors. It essentially affects their buying behavior which results to a high conversion rate. Read on and find out how site seals can be a great…
For better or worse, the Internet is slowly shaping our future. At the rate that we’re in, it’s no surprise that paper money will be a thing of the past. Countries like Singapore and South Korea are…
In the internet-powered society we currently live in, the dangers of cyber threats are starting to get more and more dangerous than before. Since almost everything can be found online, hackers…
Facebook shocked its users on Friday after disclosing a recent security breach that affected over 50 million users by extracting passwords form security tokens. As a countermeasure, Facebook logged…
The Information Security Officers Group (ISOG), an organization of information security officers from leading the country’s leading financial organizations, will host the biggest cybersecurity event…
Two weeks ago, Google did what they said they would and flagged HTTP websites as “Not Secure” with the release of Chrome 68. A lot of websites already wised up and upgraded their websites to the safer…
Countries from the APAC Region have been making great efforts to improve their cybersecurity. From forging meaningful partnerships to improving disaster tactics, these recent developments will make…
It’s no secret that hackers will stop at nothing to steal as much credentials as possible. They develop new schemes almost every day designed for injecting malware, keylogger scripts, and other types…
Over the course of a year, Google has announced some drastic changes in an effort to cultivate a culture of safety and security online. Google’s efforts revolved around flagging HTTP websites in an…
The future of AI looks bright for SMBs. With more processes being taken over by Artificial Intelligence, Small and Medium Businesses will have more opportunity to compete in their industries.
What we can learn from the string of data breaches of past years is that cyberattacks affect everyone, from individuals to large organizations alike. Despite this, only 56% of companies in the entire…