Blog/blog¶ºÒõ¹Ý is a leading Certificate Authority for TLS/SSL certificate management tools for the enterprise and identity authentication security solutions.Fri, 12 Sep 2025 14:40:50 UTC¶ºÒõ¹Ý¡¯s October 2023 CA/Browser Forum Recap?| ¶ºÒõ¹Ý¶ºÒõ¹Ý joins the voluntary group of certificate authorities (CAs), industry standards and audit bodies, and certificate consumer vendors that make up the Certification Authority/Browser (CA/B) Forum./blog/ca-browser-forum-recap-october-2023Tue, 30 Apr 2024 16:37:57 UTCDNS Failover & Secondary DNS | ¶ºÒõ¹ÝSecondary DNS focuses on ensuring redundancy and reliability of your authoritative DNS records. It involves using two separate DNS services./blog/dns-failover-and-secondary-dnsWed, 1 Nov 2023 10:45:32 UTC¶ºÒõ¹Ý 2024 Security Predictions?| ¶ºÒõ¹ÝIt¡¯s once again time to look back on security developments over the past year, gaze into the future, and make some bold security predictions about the future/blog/2024-security-predictionsFri, 12 Sep 2025 15:32:01 UTC¶ºÒõ¹Ý Labs: Innovating for a Secure Digital Future | ¶ºÒõ¹ÝPQC, IoT and AI: three tiny acronyms making massive waves in the world of digital security. But those best prepared for the threats and innovations we know are coming aren¡¯t just reading about them./blog/digicert-labs-innovating-for-a-secure-digital-futureFri, 5 Sep 2025 13:47:45 UTCThe Keys To Unlocking Secure, Sustainable EV Charging | ¶ºÒõ¹ÝAutomakers, EV charger manufacturers, and security companies need to work together to equip the EV charging infrastructure with availability, interoperability, and trust./blog/the-keys-to-unlocking-secure-sustainable-ev-chargingFri, 5 Sep 2025 13:47:23 UTCBlog category | ¶ºÒõ¹Ý¶ºÒõ¹Ý has classified its blog topics under several categories that relate to areas of digital trust, IoT, TLS/SSL certificates, and more. Check out this section of our website to find a subject you want to learn more about. /blog/categoryTue, 28 Jan 2025 20:45:32 UTCPerils of DIY Private PKI | ¶ºÒõ¹ÝMany choose to construct and manage their own Public Key Infrastructures¨C a DIY PKI. Understanding what it takes to manage a PKI can help you determine if you want a DIY PKI solution or the help of a private Certificate Authority (CA)./blog/perils-of-diy-private-pkiFri, 5 Apr 2024 17:05:12 UTCA Guide to TLS Certificate Revocations | ¶ºÒõ¹Ý.comA Guide to TLS/SSL Certificate Revocations. Certificate revocations can be disruptive and painful to customers and relying parties. We often get questions about why certificates were revoked, who said we need to revoke them and why more notice was not provided. This article provides background and details to these and other related questions./blog/a-guide-to-tls-certificate-revocationsThu, 11 Sep 2025 20:25:40 UTCCloud Security Solutions | ¶ºÒõ¹Ý.com¶ºÒõ¹Ý's PKI-based cloud security solutions enable strong security for cloud storage, enterprise systems, containerization, virtualization, orchestration, DevOps and contract signing./blog/cloud-security-solutionsTue, 30 Apr 2024 15:24:14 UTC1-Year Certificates are Here: What Now? | ¶ºÒõ¹Ý.comStarting today, certificates have a max validity of 398 days, approximately one year. It¡¯s here, whether you¡¯re ready or not. Since Apple announced they would enforce shorter lifetimes on certificates, both Chrome and Mozilla followed their lead./blog/1-year-tls-ssl-certificates-are-here-what-nowTue, 30 Apr 2024 14:21:16 UTCStay Smarter Than Your Smart Home: 7 Ways to Protect Your Home and IoT Devices | ¶ºÒõ¹Ý.comStay Smarter Than Your Smart Home: 7 Ways to Protect Your Home and IoT Devices. From smart thermostats to baby monitors, the IoT devices in your home make life more convenient for you, but they also can expose you and your personal information to unwanted cyberattacks./blog/7-ways-to-protect-your-home-and-iot-devicesThu, 11 Sep 2025 21:01:52 UTCA Guide to Multi-Factor Authentication | ¶ºÒõ¹Ý.comWhat Is Multi-Factor Authentication? How Does Multi-Factor Authentication Add Security Benefits? What Multi-Factor Authentication Options Are Available for Mobile Devices? How Is Multi-Factor Authentication Implemented in the Cloud? Read on for more info./blog/a-guide-to-multi-factor-authenticationTue, 30 Apr 2024 14:46:28 UTCWhat IoMT Device Manufacturers Can Learn from Smart Home IoT | ¶ºÒõ¹Ý.comA first step in securing sensitive health information is to secure connected Internet of Medical Things (IoMT) devices. Many run on outdated software and there are around 10 billion IoMT devices today, but that is expected to quintuple by 2028, to 50 billion./blog/what-iomt-device-manufacturers-can-learn-from-smart-home-iotMon, 27 May 2024 16:47:37 UTCSecurity of Online Learning | ¶ºÒõ¹Ý.comSecurity of Online Learning. Schools and teachers need to consider authentication, access control, data integrity and content protection to keep their courses and students safe./blog/security-of-online-learningWed, 27 Aug 2025 17:42:13 UTCGetting Ready for BIMI: Prep Your Logo | ¶ºÒõ¹Ý.comIn today¡¯s post we¡¯ll go into detail on the first step you need to take to get ready for Brand Indicators for Message Identification (BIMI): To prepare for acquiring a VMC ¡ª and general BIMI-readiness ¡ª your logo must be in Scalable Vector Graphic (SVG) format./blog/getting-ready-for-bimi-prep-your-logoFri, 13 Dec 2024 20:37:06 UTCCredentialing Devices, Users at Scale and When They Connect: This Is Not Your Grandfather¡¯s PKI | ¶ºÒõ¹Ý.comHow PKI Serves as a Solution for Both Devices and Users. Device identity (or device birth certificate) involves pinpointing what exactly is connecting to the network./blog/credentialing-devices-users-at-scale-and-when-they-connect-this-is-not-your-grandfathers-pkiWed, 18 Oct 2023 11:58:03 UTCWhy Elections are Not 100% Online ¡ª Yet | ¶ºÒõ¹Ý.comWhy can¡¯t we all vote remotely from a computer? How secure is voting by mail? What is the likelihood of malicious election interference? Why can¡¯t we move to online voting?/blog/why-elections-are-not-100-online-yetFri, 10 May 2024 15:53:37 UTCGet the Most Out of the ¶ºÒõ¹Ý CertCentral App in ServiceNow | ¶ºÒõ¹Ý.com¶ºÒõ¹Ý now offers the ¶ºÒõ¹Ý? CertCentral? Manager app in the ServiceNow Certificate Inventory and Management store. Here are a few tips on how to easily set it up and successfully use it to its full potential./blog/get-the-most-out-of-the-digicert-certcentral-app-in-servicenowThu, 23 May 2024 17:23:37 UTCQualify for a VMC - How to Trademark Your Logo | ¶ºÒõ¹Ý.comThis week for VMC (Verified Mark Certificate), we¡¯ll go over another equally critical step: How to check if your brand logo is a registered trademark and apply for a registered trademark if it is not./blog/qualify-for-a-vmc-how-to-trademark-your-logoFri, 13 Dec 2024 20:30:39 UTC5G Migration: Securing Connected Devices | ¶ºÒõ¹Ý.comJust like PKI can help secure 5G networks and the cloud, it can also help secure IoT devices. To learn more about how PKI can secure 5G migration, register for ¶ºÒõ¹Ý¡¯s webinar./blog/5g-migration-securing-connected-devicesTue, 27 Feb 2024 17:21:52 UTCSecure 5G: Securing the Cloud with PKI | ¶ºÒõ¹Ý.comAn important aspect of securing 5G is the cloud, especially as mobile network operators (MNOs) move from physical deployments to virtual./blog/secure-5g-securing-the-cloud-with-pkiTue, 30 Apr 2024 16:38:32 UTCCA/B Forum Update October 2020 | ¶ºÒõ¹Ý.comThe CA/Browser Forum met virtually from Oct. 20¨C22 for their fall meeting. There is a growing trend in the CA/B Forum to limit the fields authorized in certificates, and Google has made several announcements, including announcing a Chrome Root Store./blog/ca-b-forum-update-october-2020Tue, 30 Apr 2024 16:26:22 UTCElection Security: Secure Voter Data and Avoid Phishing | ¶ºÒõ¹Ý.comWith the U.S. elections quickly approaching, we¡¯ve been talking about various aspects of election security. Today we¡¯ll dive into trust indicators for election communications, including how to avoid phishing and secure voter data./blog/election-security-secure-voter-data-and-avoid-phishingMon, 20 May 2024 11:31:37 UTCSecuring Quantum In The Cloud?| ¶ºÒõ¹ÝWith quantum likely to rely heavily on the cloud, securing against quantum attacks will require similar measures to securing the cloud.?/blog/how-to-secure-quantum-computing-in-the-cloudThu, 27 Jun 2024 19:51:01 UTC¶ºÒõ¹Ý 2021 Security Predictions | ¶ºÒõ¹Ý.com¶ºÒõ¹Ý 2021 Security Predictions. 2020 has brought about a lot of change. Based upon changes to infosecurity brought by the pandemic and other events of 2020 we can be reasonably certain about our predictions./blog/digicert-2021-security-predictionsFri, 12 Sep 2025 17:48:49 UTCSetting Global Standards for Secure Email Certificates | ¶ºÒõ¹Ý.comThe S/MIME Certificate Working Group (SMCWG) is the newest specialist subgroup of the CA/Browser Forum, focused on creating the first global requirements for the Certification Authorities (CAs) that issue the digital certificates used in email./blog/setting-global-standards-for-secure-email-certificatesTue, 1 Oct 2024 19:48:53 UTCTop 3 Features of ¶ºÒõ¹Ý Secure Site Pro | ¶ºÒõ¹Ý.com¶ºÒõ¹Ý conducted a survey with Secure Site and Secure Site Pro customers from August to September 2020. According to current customers, here are the top three most popular features in Secure Site and Secure Site Pro/blog/top-3-features-of-digicert-secure-site-proMon, 20 May 2024 18:00:37 UTCSimplify Code Signing Around the Holidays and Always | ¶ºÒõ¹Ý.comCode signing is a critical part of your devops process to ensure that code cannot be tampered with. Using a code signing-as-a-service solution can help simplify getting code signed, make it quicker and easier for your IT team to keep code secure, and free up your IT team¡¯s bandwidth./blog/simplify-code-signing-around-the-holidays-and-alwaysTue, 30 Apr 2024 15:22:12 UTC2020 Quantum Advances and 2021 Predictions | ¶ºÒõ¹Ý.comWe¡¯ve rounded up some of the significant quantum advances of 2020 and prepared our predictions for what you can expect going into 2021./blog/2020-quantum-advances-and-2021-predictionsThu, 11 Sep 2025 15:11:05 UTC¶ºÒõ¹Ý CertCentral? Wins Best in Biz Award For Simplifying TLS Certificate Management | ¶ºÒõ¹Ý.com¶ºÒõ¹Ý is honored to be named a Best in Biz winner in the 2020 Enterprise Product of the Year in Security Software category for CertCentral./blog/digicert-certcentral-wins-best-in-biz-award-for-simplifying-tls-certificate-managementTue, 27 Feb 2024 14:33:54 UTCReport Certificate Problems and Request Key Compromise Revocation at Speed: ¶ºÒõ¹Ý's New Automated Revocation Solution | ¶ºÒõ¹Ý.comReport Certificate Problems fast and submit a report of a private key compromise quickly and automatically get a revocation, if needed, with ¶ºÒõ¹Ý¡¯s Certificate Problem Reporting tool./blog/digicerts-new-automated-revocation-solutionFri, 12 Sep 2025 13:14:57 UTCWhere Is Your Private Key? | ¶ºÒõ¹Ý.comNeed to find your private key? Learn what a private key is, and how to locate yours using common operating systems./blog/where-is-your-private-keyFri, 12 Sep 2025 14:35:24 UTCPosition on 1-Year Certificates | ¶ºÒõ¹Ý.comAt the CA/B Forum this week, Apple announced that beginning Sept. 1, newly issued publicly trusted TLS SSL Certificates are valid for no longer than 398 days./blog/position-on-1-year-certificatesThu, 25 Apr 2024 17:14:21 UTCInfographic: One Million Good Reasons To Invest In Modern PKI | ¶ºÒõ¹ÝView our Infographic IDC whitepaper that breaks down exactly why¡ªand how¡ªa modern approach to PKI could be the best investment you make this decade and how organizations save nearly $1 million annually./blog/1-million-good-reasons-to-invest-in-modern-pki-infographicFri, 10 May 2024 15:31:37 UTCOne-Year Public-Trust SSL Certificates: ¶ºÒõ¹Ý's Here to Help | ¶ºÒõ¹Ý.comOne-Year Public-Trust TLS SSL Certificates. Apple announced at the February 2020 CA/Browser Forum meeting that they will no longer accept publicly trusted TLS webserver certificates valid for longer than 398 days after Sept 1, 2020./blog/1-year-public-trust-ssl-certificatesMon, 20 May 2024 19:03:37 UTC10 Tips to Avoid Phishing Scams | ¶ºÒõ¹Ý.comSo what can you do to avoid becoming a victim of Phishing Scams? Read our top 10 Tips to avoid Phishing Scams and protect your self from harmful risks./blog/10-tips-to-avoid-phishing-scamsMon, 17 Oct 2022 14:44:01 UTC2018: A Happy New Year | ¶ºÒõ¹Ý.comIt seemed everything was new for ¶ºÒõ¹Ý in 2018. Three oncoming milestones certainly make for good cheer: the general availability of our CertCentral partner portal, the launch of our next flagship TLS/SSL certificate product, and our exploration of new certificate types. Each of these can either provide new ways for you to profit or provide new efficiencies for you.. ¶ºÒõ¹Ý looks forward to 2019 ¨C yet another new year ¨C because if it¡¯s anything like the progress we made in 2018, then 2019 looks particularly prosperous all of us. /blog/2018-a-happy-new-yearMon, 20 May 2024 13:52:37 UTC21 Online Scams You May Not Know About [Infographic] | ¶ºÒõ¹Ý.comWith new technology comes more risk for exploitation. Take a journey through time, learn about 21 online scams, and make sure you¡¯re not next on a scammers list with this infographic. ?/blog/21-online-scams-infographicTue, 30 Apr 2024 14:54:33 UTC3 Quick Facts on Why a Strong Password Policy Matters | ¶ºÒõ¹Ý.com73% of users have the same password for multiple sites, 33% use the same password every time creating an easy target for breaches and identity theft./blog/3-reasons-for-strong-password-policyTue, 18 Oct 2022 09:10:15 UTC3 Ways Cloudflare Is Innovating with Encryption | ¶ºÒõ¹Ý.comCloudflare is determined to help build a better internet. The company started in 2010 at TechCrunch Disrupt as an easy way to protect websites from attacks./blog/3-ways-cloudflare-is-innovating-with-encryptionMon, 20 May 2024 13:42:37 UTC3-Year Certificate Reissuance and Access to Order Comments | ¶ºÒõ¹Ý.comAs of 1 March 2018, all reissues for 3-year SSL/TLS certificates will be replaced with a certificate that is in compliance with CA/Browser Forum Ballot 193 guidelines and has an 825-day lifetime. We recommend reissuing your certificate as close to 825 days from the expiration date as possible to maximize the validity of your certificate and to avoid a truncated validity period. /blog/3-year-certificate-reissuance-access-order-commentsFri, 5 Sep 2025 16:03:45 UTC3-Year Certificates to Be Eliminated in Industry-Wide Change | ¶ºÒõ¹Ý.com¶ºÒõ¹Ý will stop accepting requests for three-year certificates on Tuesday, February 20, 2018./blog/3-year-certificates-eliminated-industry-wide-changeTue, 30 Apr 2024 16:18:30 UTCFour Considerations for Internet of Things | ¶ºÒõ¹Ý.comHere are four considerations that need to be addressed for the ever-increasing IoT landscape to be secured./blog/4-considerations-for-iotFri, 10 May 2024 16:07:37 UTC4 Recommendations for Integrating Security in DevOps | ¶ºÒõ¹Ý.comEvery company is looking for ways to speed up development while incorporating security. See our 4 recommendations for your integration./blog/4-recommendations-for-integrating-security-in-devopsFri, 10 May 2024 17:10:41 UTC4 Tips for Avoiding Malware | ¶ºÒõ¹Ý.comDespite how easy some malware attacks are for an attacker, malvertisement campaigns can be as dangerous as other forms of social engineering./blog/4-tips-for-avoiding-malwareFri, 12 Sep 2025 13:29:38 UTC45% of Healthcare Breaches Occur on Stolen Laptops | ¶ºÒõ¹Ý.comStolen devices such as a laptop or a USB thumb drive rarely come up when most people think of data breaches, but breaches caused by stolen devices are./blog/45-percent-healthcare-breaches-occur-on-laptopsTue, 30 Apr 2024 17:01:11 UTCFive Tips for Secure Remote Email Access | ¶ºÒõ¹Ý.comBuilding trust through secure email remote access is critical to ensuring that information remains secure and private. To combat compromised email attacks, several protocols were created to help your organization secure your remote workforce¡¯s email./blog/5-tips-for-secure-remote-email-accessMon, 30 Jun 2025 18:54:07 UTC8 Steps to Stronger WiFi Security | ¶ºÒõ¹Ý.comLearn 8 steps to better secure your WiFi network, at home and at work./blog/8-steps-stronger-wifi-securityThu, 11 Sep 2025 20:40:35 UTCA Security Solution that Learns Along with IoT Development | ¶ºÒõ¹Ý.comThe Internet of Things (IoT) has not yet reached maturity, but with all its possibilities, we¡¯re still figuring out a lot about the IoT: what we want from it, what level of privacy we are comfortable with, where the legal limits should lie and how to secure it./blog/a-security-solution-that-learns-along-with-iot-developmentThu, 23 May 2024 16:16:37 UTCIntro to Penetration Testing Part 2: Adopting a Pen Tester's Mindset | ¶ºÒõ¹Ý.comRe-evaluate your home network security with this home security best practices checklist./blog/adopting-pentesters-mindset-readyMon, 20 May 2024 11:32:37 UTCAdvancing the Goal of Automated PKI for More Secure DevOps | ¶ºÒõ¹Ý.com¶ºÒõ¹Ý joins Venafi to announce a partnership that will significantly advance security for DevOps./blog/advancing-goal-automated-pki-secure-devopsWed, 20 Mar 2024 12:51:23 UTCEnterprise Security: The Advantages of Using EV Certificates | ¶ºÒõ¹Ý.comEV Certificates are not only a great enterprise asset for gaining customer trust, but are also essential for protecting consumer information exchange./blog/advantages-using-ev-certificatesFri, 12 Sep 2025 15:57:56 UTCAndroid Browser Bug Allows Same Origin Policy Bypass | ¶ºÒõ¹Ý.comThe AOSP browser in pre-4.4 Android devices contains a vulnerability, affecting a huge number of Android devices in use right now./blog/android-browser-bug-allows-origin-policy-bypassThu, 4 Apr 2024 16:32:19 UTCAndroid P Will Default to HTTPS Connections for All Apps | ¶ºÒõ¹Ý.comThe next version of Android will default to blocking HTTP traffic in apps by default. This will apply to all apps that target Android P and will require a specific declaration in the app¡¯s manifest if any HTTP connections are needed./blog/android-p-will-default-https-connections-appsFri, 24 May 2024 15:40:37 UTCAnnouncing ¶ºÒõ¹Ý Secure Site: The Industry¡¯s Most Feature-Rich TLS Certificate Solution | ¶ºÒõ¹Ý.comWe have launched ¶ºÒõ¹Ý Secure Site ¨C a new suite of certificate solutions for organizations prioritizing online trust and identity. We are proud of the CA infrastructure we have built here at ¶ºÒõ¹Ý. We have put engineering first to make sure that as your security partner, nothing stands in your way. Whether its issuing thousands of certificates per second, the fastest OCSP response times in the industry, or having support experts available 24/7, ¶ºÒõ¹Ý is always enabling the best in security practices and performance./blog/announcing-new-secure-site-ssl-tls-certificatesTue, 30 Apr 2024 15:58:23 UTCSupporting the Anonymous Use of Facebook via Tor | ¶ºÒõ¹Ý.com¶ºÒõ¹Ý has issued an SSL Certificate to Facebook¡¯s .onion address for use in the Tor browser./blog/anonymous-facebook-via-torMon, 29 Apr 2024 12:06:53 UTCAnthem Hack: Was It Preventable? | ¶ºÒõ¹Ý.comA look back at the Anthem hack and what possibly could have prevented the breach of 80 million customer records./blog/anthem-hack-preventableThu, 25 Apr 2024 18:10:38 UTCAlways-On SSL Means New Life for Privacy and Security Online | ¶ºÒõ¹Ý.comAlways-On SSL is critical to online user privacy, security, and ensuring that critical data remains safe between users and the service providers they trust./blog/aossl-online-privacy-securityFri, 20 Jun 2025 16:35:02 UTCApple Announces Certificate Transparency Requirement | ¶ºÒõ¹Ý.comollowing their 2018 WWDC conference, Apple announced they will begin requiring Certificate Transparency (CT) for all SSL/TLS certificates issued after October 15, 2018./blog/apple-announces-certificate-transparency-requirementThu, 11 Sep 2025 20:23:25 UTCAssessing the London Protocol | ¶ºÒõ¹Ý.comThe London Protocol was originally proposed as a potential joint effort by CA Security Council members to combat phishing. All large commercial CAs revoke certificates for phishing websites when they are brought to their attention, but they do not proactively monitor their customers sites, and generally do not share information about misuse of certificates with each other. When it was announced in London, the scope was expanded to include all CAs that wish to participate. Whether CAs have a role in combating phishing has at times been controversial, with some CAs believing they have no responsibility to take any action against phishing. We disagree. Phishing activity is a clear violation of our Subscriber Agreement (1.4 (iii) ¡°make misrepresentations about your Certificate, yourself, or your affiliation with any entity, or breach the confidence of a third party¡±). /blog/assessing-the-london-protocolTue, 30 Apr 2024 15:20:42 UTCThe Role of Authentication in Online Security | ¶ºÒõ¹ÝThe ability to prove identity is the starting point for almost every secure interaction online. Authentication is the gatekeeper that determines digital trust. /blog/authentication-in-online-securityThu, 22 May 2025 12:22:09 UTCAutomating Certificate Management: How SSL APIs Work | ¶ºÒõ¹Ý.comAPIs combined with cloud-based certificate management and deployment services make certificate lifecycle management in the enterprise network easy./blog/automating-certificate-management-ssl-apis-workMon, 20 May 2024 19:01:37 UTCBattling to Stop Data Leaks from the Inside | ¶ºÒõ¹Ý.comA new study reveals that many employees do not know how to handle sensitive data, and because of this, data leaks are happening from inside organizations./blog/battling-to-stop-data-leaks-from-the-insideFri, 10 May 2024 17:43:37 UTCBenefits of an Email Distribution List | ¶ºÒõ¹Ý.comStaying on top of SSL Certificate renewals must always remain a top priority for server and network administrators./blog/benefits-of-email-distribution-listTue, 1 Oct 2024 19:50:01 UTCThe Benefits of Managed PKI Services for SSL Certificates | ¶ºÒõ¹Ý¶ºÒõ¹Ý Managed PKI offers fastest certificate issuance, same day account setup, and automatic certificate installation saving valuable time and money./blog/benefits-of-managed-pki-for-sslWed, 16 Jul 2025 18:59:57 UTCBenefits of Partnering with a Certificate Authority | ¶ºÒõ¹Ý.comPartners may expand their business by offering data security through provided tools and platforms available by working with a trusted Certificate Authority./blog/benefits-of-partnering-with-a-certificate-authorityMon, 20 May 2024 18:38:37 UTCThe Best Customer Experience is Securing Customer Data | ¶ºÒõ¹Ý.comSelf-service customer service and online contact channels increase the exposure of sensitive data and improves customer experience and customer trust./blog/best-customer-experience-securing-customer-dataFri, 20 Jun 2025 16:38:19 UTCBest Customer Reactions to "the ¶ºÒõ¹Ý Difference" | ¶ºÒõ¹Ý.comHere are some reactions from people who experienced the difference between ¶ºÒõ¹Ý and... everyone else./blog/best-customer-reactions-digicert-differenceTue, 20 Jun 2023 12:45:54 UTCBest Practices for Timestamping | ¶ºÒõ¹Ý.comOne of the most important parts of code signing is timestamping. This is part of the signing process that allows software and users to recognize a valid code signing signature even after the certificate has expired./blog/best-practices-timestampingThu, 11 Sep 2025 20:33:33 UTCBetter Insights and Improved Validation Processes | ¶ºÒõ¹Ý.comRead about recent bug fixes and new releases, including Request DNS and File-Based Authentication for New EV and OV Orders and Subdomains for Pre-Approved DCV Approver Email Addresses./blog/better-insights-improved-validation-processesWed, 20 Mar 2024 12:54:28 UTCBig Changes Coming to Legacy Partner Portals and API | ¶ºÒõ¹Ý.comChanges are coming for our legacy partner portals and APIs. To complete our brand transition as the leader in TLS/SSL products, several elements of our legacy Encryption Everywhere, GeoTrust, RapidSSL, Symantec and Thawte partner portals and APIs will meet their end-of-life (EOL) between now and mid-April 2020. The dates vary by brand and platform./blog/big-changes-coming-to-legacy-partner-portals-and-apiMon, 20 May 2024 18:04:37 UTCBiometric Authentication: An Added Layer of Security or Security Risk? | ¶ºÒõ¹Ý.comWe are often blinded by the ¡°awe¡± factor of new technology. But before jumping in head first, take time to make sure the pros are worth the cons./blog/biometric-authentication-methodsTue, 30 Apr 2024 14:55:54 UTCThe Value of Authentication | ¶ºÒõ¹Ý.comThe value of a secure TLS handshake goes as far as the value of the data being encrypted. Regardless of the interaction, proper authentication is essential./blog/blog-value-authenticationTue, 30 Apr 2024 16:53:49 UTCBrowser Security Icon Updates and SHA-1 Deprecation | ¶ºÒõ¹Ý.comLatest versions of Chrome and Firefox include updated security icons in the address bar and news for the SHA-1 deprecation./blog/browser-security-icon-updates-sha-1-deprecationFri, 12 Sep 2025 13:10:42 UTCHow to Build a PKI That Scales: First 3 Considerations [Interview] | ¶ºÒõ¹Ý.com¶ºÒõ¹Ý interviews Darin Andrew, Senior PKI Architect at ¶ºÒõ¹Ý and poses as the head of engineering at a medium-sized company to ask him how we can build a PKI that¡¯s ready to scale. The interview walks through the high-level of PKI and the main ways PKI is typically used in a medium-sized company, beginning to build an enterprise-level PKI. After he taught us what was critical to PKI, he went on to teach us the how to implement PKI. There will be additional interviews in this series. Stay tuned. /blog/building-a-pki-plan-that-scales-first-3-considerationsThu, 11 Sep 2025 14:54:04 UTCHow SSL Is Helping BYOD Security and Mobile Data Protection | ¶ºÒõ¹Ý.com80% of employees are currently using their own device to access company resources. SSL has proven effective for data security in response to BYOD challenges./blog/byod-security-mobile-data-challengesMon, 27 May 2024 16:42:37 UTCCA/B Forum Update on EV Certificate Improvements | ¶ºÒõ¹Ý.comThe CA/Browser (CA/B) Forum held a virtual face-to-face event two weeks ago, where browsers and CAs considered several important initiatives. Here are a few highlights./blog/cab-forum-update-on-ev-certificate-improvementsTue, 30 Apr 2024 16:48:47 UTCCA/B Forum Votes to Shorten Certificate Lifetime Validity Periods: How It Impacts You | ¶ºÒõ¹Ý.comThe CAB Forum meetings and discussions attempt to build consensus on rules and guidelines about global digital certificate practices./blog/cabforum-votes-shorten-certificate-lifetime-validity-periods-impactsFri, 12 Sep 2025 14:38:42 UTCCan Multi-Factor Authentication Prevent a Data Breach? | ¶ºÒõ¹Ý.comA strong password policy isn't foolproof. Having multiple layers of authentication creates extra protection in the event of a data breach./blog/can-multi-factor-authentication-prevent-data-breachThu, 18 Apr 2024 17:58:06 UTCAdvantages to Using a Centralized Management Platform for SSL Certificates | ¶ºÒõ¹Ý.comIt is essential to have a single, centralized platform to handle the installation, deployment, monitoring, and total management of all SSL Certificates./blog/centralized-certificate-management-platformMon, 30 Jun 2025 18:40:13 UTCCertificate Inspector: Agent Deployment Strategies | ¶ºÒõ¹Ý.comPros and cons of two ¶ºÒõ¹Ý Certificate Inspector Agent deployment strategies./blog/certificate-inspector-deployment-strategiesFri, 12 Sep 2025 19:29:04 UTCCertificate Inspector: Missing Fields | ¶ºÒõ¹Ý.comIn this post we¡¯ll be zooming in on specific fields ¶ºÒõ¹Ý Certificate Inspector scans for that are missing or input incorrectly./blog/certificate-inspector-missing-fieldsThu, 23 May 2024 16:19:46 UTCCertificate Inspector: Port Scanning Recommendations | ¶ºÒõ¹Ý.comLearn what ports you can scan with ¶ºÒõ¹Ý Certificate Inspector to maximize it's effectiveness./blog/certificate-inspector-port-scanningFri, 12 Sep 2025 13:50:16 UTCStop Certificate Pinning | ¶ºÒõ¹Ý.comWhat is Certificate Pinning? How does it work? Certificate Pinning is the practice of associating a website host with its expected certificate, public key, issuer, or root CA./blog/certificate-pinning-what-is-certificate-pinningThu, 11 Sep 2025 20:59:42 UTCCertificate Transparency: FAQs | ¶ºÒõ¹Ý.comCertificate Transparency provides a way for every certificate issued by any publicly trusted CA to be publicly logged, monitored, and audited./blog/certificate-transparency-faqsTue, 30 Apr 2024 16:16:59 UTCCertificate Transparency Required for EV Certificates to Show Green Address Bar in Chrome | ¶ºÒõ¹Ý.comStarting in January 2015, Google Chrome will not show the green address bar for EV SSL Certificates that do not appear in a public CT log./blog/certificate-transparency-required-ev-certificates-show-green-address-bar-chromeWed, 3 Apr 2024 12:09:06 UTCCertification Authority Authorization Checking: What is it, and Why Does it Matter? | ¶ºÒõ¹Ý.comWhat is Certificate Authority Authorization (CAA) Checking and why does it matter? A Certification Authority Authorization (CAA) record is a DNS Resource Record which allows a domain owner to specify which CAs are authorized to issue certificates for their domain(s) and, by implication, which aren¡¯t./blog/certification-authority-authorization-checking-what-is-it-and-why-does-it-matterTue, 30 Apr 2024 16:03:30 UTCYour Children Could Open You to Attack | ¶ºÒõ¹Ý.comChildren and teens not only risk their own security while online, but they also risk the security of their entire family./blog/children-online-attacksMon, 29 Apr 2024 12:45:25 UTCHow to Choose the Right Certificate Authority Partner | ¶ºÒõ¹Ý.comLooking for a Certificate Authority partner for SSL/TLS certificates, there are many things you¡¯ll want to think about before you make a final decision./blog/choose-right-certificate-authority-partnerFri, 24 May 2024 15:04:37 UTCChrome Connection Tab Changes to Security Panel | ¶ºÒõ¹Ý.comGoogle Chrome's Security Panel replaces the Connection Tab. It's more user friendly and offers additional information for developers./blog/chrome-connection-tab-changes-security-panelMon, 20 May 2024 11:56:37 UTCChrome Will Mark HTTP Sites "Not Secure" in January | ¶ºÒõ¹Ý.comIn a bold move to secure the web, Google's Chrome browser will explicitly state when sites are not secure and using an HTTP connection./blog/chrome-will-mark-http-sites-as-not-secure-in-januaryThu, 11 Sep 2025 15:08:09 UTCClosing the Security Gap between Experts and Regular Users | ¶ºÒõ¹Ý.comA recent Google study shows the way in which experts and non-experts vary in their security practices./blog/closing-the-security-gap-experts-and-usersTue, 30 Apr 2024 14:02:40 UTCCoding while celebrating | ¶ºÒõ¹Ý.com¶ºÒõ¹Ý defaulted reuse of domain control validation (DCV) to ON for subsequent orders. Now we¡¯ve added a parameter such that you can choose to keep it enabled or just turn it off. This means that if you don¡¯t change anything, everything will remain as it always was. If you want to add additional security to your customers, you can now do so on a per-order basis. We added a corresponding account-level setting, which allows you to change the default value for all ensuing orders in your account (i.e. to default to not reuse DCV, but only turn it ON for specific orders). Not all these changes are on our legacy Symantec partner platform but we are working on getting our CertCentral platform to where we want it to be ¨C and we¡¯re seeing great progress in that! Keep checking this blog to get more updates on our progress./blog/coding-while-celebratingTue, 30 Apr 2024 16:29:03 UTCCommunications Transparency | ¶ºÒõ¹Ý.comThe way ¶ºÒõ¹Ý communicates is crucial. We no longer rely on email alone, flung out to our entire database of Partner contacts. Instead of emailing every communication: We cross-post virtually all emails on our Partner Blog, just in case you ¡°didn¡¯t get that email.¡± That includes our service notifications, as well as our newsletters and even invitations to some of our online events. To ensure that there¡¯s no ¡°didn¡¯t see that blog post¡± equivalent, we offer our Partner Blog also via an RSS feed. Please follow it! We¡¯re also rolling out The ¶ºÒõ¹Ý Partner Portal at digicertpartners.com. /blog/communications-transparencyMon, 20 May 2024 19:06:37 UTCMajority of Companies Prepared for Upcoming Chrome 70 Distrust of Symantec-Issued TLS Certificates | ¶ºÒõ¹Ý.com¶ºÒõ¹Ý ready to help those yet to act with quick, free replacement process/blog/companies-prepared-for-chrome-70-distrust-of-symantec-ssl-certificatesFri, 12 Sep 2025 16:06:22 UTCConnected Cars Need a Security Solution: Use PKI | ¶ºÒõ¹Ý.comIs there an industry-wide solution that can be used to secure vulnerabilities in connected cars? We think so. Learn about using PKI for automotives./blog/connected-cars-need-security-use-pkiTue, 5 Mar 2024 09:47:08 UTCControlling IoT Authentication Opportunities in the Automotive Industry | ¶ºÒõ¹Ý.comWhile the automotive community has engaged with the diagnostic community in forging secure certificate-based authentication standards, there's still no finalized agreement about how this will be implemented./blog/controlling-iot-authentication-opportunities-in-the-automotive-industryTue, 30 Apr 2024 16:05:00 UTCCracking SSL Encryption is Beyond Human Capacity | ¶ºÒõ¹Ý.comEven with the astronomical computing power needed to crack 256-bit SSL encryption, the cost to break SSL encryption makes it impossible./blog/cost-crack-256-bit-ssl-encryptionFri, 10 May 2024 14:34:38 UTCCountdown to Launch | ¶ºÒõ¹Ý.com¶ºÒõ¹Ý has been busy adding new features to our partner portals or APIs. We've been concentrating on building the next generation partner platform. Of course, we still want to resolve any issues with the existing services (whether large or small), including the following in our latest update. /blog/countdown-to-launchMon, 20 May 2024 18:47:17 UTCCreating Strong Password Policy Best Practices | ¶ºÒõ¹Ý.comA strong password policy is the front line of defense to confidential user information. Admins should create and enforce strong password policies./blog/creating-password-policy-best-practicesMon, 27 May 2024 16:16:37 UTCCreating a Secure BYOD Enterprise | ¶ºÒõ¹Ý.comBYOD is no longer hypothetical. Enterprises must adapt to face security threats./blog/creating-secure-byod-enterpriseTue, 5 Mar 2024 17:22:50 UTCCyber Insurance: The Next Big Thing? | ¶ºÒõ¹Ý.comIn response to the past years¡¯ big hacks, cyber insurance has won the trust of many organizations¡ªbut is it still too premature to trust?/blog/cyber-insurance-the-next-big-thingFri, 12 Sep 2025 16:20:08 UTCDan: Identity Management | ¶ºÒõ¹Ý.comThe most-trusted global provider of high-assurance TLS/SSL, PKI, IoT and signing solutions./blog/dan-identity-managementThu, 4 Sep 2025 21:39:18 UTCDangers of Connecting to Public Wi-Fi | ¶ºÒõ¹Ý.comWhile public Wi-Fi provides convenience for all, it plays directly into cyber criminal's hands.?/blog/dangers-of-connecting-to-public-wi-fiThu, 23 May 2024 17:18:37 UTCDangers of Visual Hacking | ¶ºÒõ¹Ý.comA recent experiment by Ponemon Institute shows that hacking techniques need not stay solely in the digital ream. Visual gives hackers a way into networks./blog/dangers-of-visual-hackingMon, 22 Apr 2024 15:32:15 UTCHow Data Security Is Affecting Consumerism | ¶ºÒõ¹Ý.comCompanies miss out on the benefits of data security as a marketing edge. Understand the importance of data security to consumers, and gain their trust./blog/data-security-affecting-consumerismThu, 4 Apr 2024 16:08:34 UTCDDoS Attacks: 3 Tips for Aftermath | ¶ºÒõ¹Ý.comHere are 3 quick tips for gleaning something useful out of a DDoS attack./blog/ddos-attacks-3-tips-for-aftermathFri, 12 Sep 2025 14:07:37 UTCDebunking SSL and HTTPS Security Myths | ¶ºÒõ¹Ý.comMyths about SSL and HTTPS may elicit false misperceptions about proper enterprise security. Here are some of the most common myths debunked./blog/debunking-ssl-and-https-security-mythsMon, 20 May 2024 12:17:37 UTCDEF CON 23 Recap | ¶ºÒõ¹Ý.comThis year's DEF CON illustrated vulnerabilities in smart automobiles, encouraging IoT manufacturers to make security a top priority./blog/def-con-recapThu, 4 Sep 2025 21:35:34 UTCDeprecating TLS 1.0 & 1.1 | ¶ºÒõ¹Ý.com¶ºÒõ¹Ý will be disabling TLS 1.0 and 1.1 for all our services, including our website and API, on April 1st. (We promise that isn¡¯t an April Fool¡¯s joke.)/blog/depreciating-tls-1-0-and-1-1Mon, 22 Apr 2024 15:38:15 UTC¶ºÒõ¹Ý Preparedness | ¶ºÒõ¹Ý.comWe understand that this is a time of heightened concern, and we want to reassure our customers and partners that we are prepared to deliver critical services and uptime of your secure web operations. We are committed to continue providing global security solutions with knowledgeable customer support and validation services./blog/digicert-and-covid-19-preparednessThu, 19 Jun 2025 21:46:02 UTC¶ºÒõ¹Ý Announces Post-Quantum Computing Tool Kit | ¶ºÒõ¹Ý.comThis PQC test kit is designed for technical users who want to try out the process of installing the hybrid RSA/PQC certificate (TLS or IoT). The kit will be useful for PKI architects and technical solution designers across a variety of industries/blog/digicert-announces-post-quantum-computing-test-kitFri, 24 May 2024 15:06:37 UTC¶ºÒõ¹Ý Certificates Will Be Publicly Logged Starting Feb. 1 | ¶ºÒõ¹Ý.comStarting February 1, 2018 ¶ºÒõ¹Ý will submit all newly issued and publicly trusted SSL certificates to Certificate Transparency (CT) logs by default./blog/digicert-certificates-will-be-publicly-logged-feb-1Fri, 19 Apr 2024 15:58:50 UTC¶ºÒõ¹Ý Labs to Explore Categorizing IoT Devices Based on Security, Privacy Using AI and Pattern Recognition Technologies | ¶ºÒõ¹Ý.com¶ºÒõ¹Ý Labs to Explore Categorizing IoT Devices (Internet of Things) Based on Security, Privacy Using AI and Pattern Recognition Technologies/blog/digicert-exploring-iot-device-categorization-using-ai-pattern-recognitionTue, 30 Apr 2024 15:35:08 UTC¶ºÒõ¹Ý is First Certificate Authority Compatible with Google Certificate Transparency | ¶ºÒõ¹Ý.com¶ºÒõ¹Ý is the first CA to offer Certificate Transparency compatibility, which detects SSL interference by third-parties organizations and rogue nations./blog/digicert-first-ca-to-offer-compatibility-with-googles-certificate-transparencyFri, 10 May 2024 15:37:37 UTC¶ºÒõ¹Ý Helping Customers Replace Symantec-Issued Certificates | ¶ºÒõ¹Ý.com¶ºÒõ¹Ý released a tool that customers can use to determine whether certificate replacement is required./blog/digicert-helping-customers-replace-symantec-certificatesTue, 30 Apr 2024 15:26:30 UTC¶ºÒõ¹Ý and the International Data Exchange Service | ¶ºÒõ¹Ý.com¶ºÒõ¹Ý is one of the IRS-approved Certificate Authorities that can issue SSL Certificates needed to submit data to IDES./blog/digicert-ides-fatcaThu, 11 Sep 2025 20:37:40 UTC¶ºÒõ¹Ý Supports VMCs for Gmail's BIMI Pilot; Company Logos in Emails Take an Important Step Forward | ¶ºÒõ¹Ý.com¶ºÒõ¹Ý Issues VMCs for Gmail's BIMI Pilot. The GMail pilot is an exiting step as the first actual implemntation of BIMI in verifying the use of Verified Mark Certificates (VMCs) and presenting logos after verifying Domain-based Message Authentication, Reporting & Conformance (DMARC) security is enabled and verifying the emails authenticity./blog/digicert-issues-verified-mark-certificates-for-gmails-bimi-pilotFri, 13 Dec 2024 20:38:05 UTC¶ºÒõ¹Ý OCSP-Stapling Improves NGINX Server Security | ¶ºÒõ¹Ý.comOCSP-Stapling takes basic OCSP to the next level of trust in verifying a valid SSL Certificate online./blog/digicert-ocsp-stapling-improves-nginx-securityMon, 29 Apr 2024 11:03:32 UTC¶ºÒõ¹Ý on Quantum 3: When it is necessary to start transitioning to quantum-safe algorithms | ¶ºÒõ¹Ý.comWhen to Start Transitioning to Quantum-safe Algorithms. In this article, we will discuss how to determine when it is necessary to start transitioning to quantum-safe algorithms. The answer will be different for every organization/blog/digicert-on-quantum-3-when-to-transition-to-quantum-safe-algorithmsMon, 22 Apr 2024 15:35:25 UTC¶ºÒõ¹Ý on Quantum: National Academy of Sciences Report | ¶ºÒõ¹Ý.comThis is the first of a series of technical blogs that ¶ºÒõ¹Ý is publishing on quantum computing and post-quantum transition. Upcoming articles will provide additional, easy to understand information about what is happening and steps that can be taken now to prepare for the future. Bookmark our blog and follow us on Twitter @digicert to stay informed. The Committee on Technical Assessment of the Feasibility and Implications of Quantum computing, part of the National Academy of Sciences, recently released a report entitled ¡°Quantum Computing: Progress and Prospects¡±. The 200-page report gathers the consensus of industry experts and conveys an important message about the current state of quantum computing and its threat to modern cryptography: the time to start preparing for a quantum-safe future is now. /blog/digicert-on-quantum-national-academy-of-sciences-reportMon, 20 May 2024 18:22:37 UTC¶ºÒõ¹Ý pushes underscore extension | ¶ºÒõ¹Ý.com¶ºÒõ¹Ý and all other CAs are now required to revoke certificates with underscores to comply with new industry standards. This applies to all publicly-trusted SSL certificates which contain any domain names with an underscore (in the Common Name or SANs). This does not affect other types of certificates, such as code signing, document signing, and so on./blog/digicert-pushes-underscore-extensionMon, 4 Mar 2024 16:58:38 UTCMoving forward: What ¶ºÒõ¹Ý¡¯s CT2 log retirement means for you | ¶ºÒõ¹Ý.comGoogle announced its plans to deprecate the CT2 log used for logging certificates under the Certificate Transparency program. This announcement does not impact ¶ºÒõ¹Ý certificates. Current and future certificates issued by ¶ºÒõ¹Ý will continue to be trusted and work without any customer action. The events leading to the deprecation of the CT2 log do not impact our CA or three other CT logs, which operate on completely different infrastructure that is segmented from CT2. /blog/digicert-statement-on-ct2-logFri, 5 Apr 2024 16:46:38 UTC¶ºÒõ¹Ý Statement on Trustico Certificate Revocation | ¶ºÒõ¹Ý.comIn communications today, Trustico has suggested that the certificate revocation is due to the upcoming Google Chrome distrust of Symantec roots. That is incorrect. ¶ºÒõ¹Ý wants to make it clear that the certificates needed to be revoked because Trustico sent us the private keys; this has nothing to do with future potential distrust dates. The upcoming Chrome distrust situation is entirely separate. We are working closely to help customers with certificates affected by the browser distrust, and we are offering free replacement certificates through their existing customer portals. That process is well underway.¡±/blog/digicert-statement-trustico-certificate-revocationTue, 30 Apr 2024 15:38:55 UTC¶ºÒõ¹Ý to Acquire Symantec's Website Security Business | ¶ºÒõ¹Ý.comToday, we are excited to announce our agreement to acquire Symantec¡¯s website security business, which includes both the SSL/TLS and IoT business units./blog/digicert-to-acquire-symantec-website-security-businessTue, 5 Mar 2024 17:36:29 UTCWhat to Expect with the New ¶ºÒõ¹Ý: Welcoming Symantec Customers, Partners, & Employees | ¶ºÒõ¹Ý.comAfter much anticipation, I¡¯m happy to share the news that we completed our acquisition of Symantec¡¯s Website Security and related PKI solutions./blog/digicert-welcoming-symantec-customers-partners-and-employeesWed, 28 Feb 2024 09:50:08 UTC¶ºÒõ¹Ý Partners with Wireless Broadband Alliance for Next-Gen WiFi Security | ¶ºÒõ¹Ý.comAs the first Certificate Authority to join the WBA, ¶ºÒõ¹Ý brings our security expertise to help develop the next generation of WiFi security./blog/digicert-wireless-broadband-alliance-wifi-securityTue, 30 Apr 2024 15:59:33 UTCWhat is Secure to Use? | Zoner & ¶ºÒõ¹Ý Partner Case Study | ¶ºÒõ¹Ý.comWhat is Secure to Use? Zoner & ¶ºÒõ¹Ý Partner Case Study. or the people at Zoner, authentication is as important as website security and thats why they partnered with ¶ºÒõ¹Ý./blog/digicert-zoner-partner-case-study-what-is-secure-to-useFri, 10 May 2024 16:55:37 UTC¶ºÒõ¹Ý¡¯s Certificate Transparency Log Approved | ¶ºÒõ¹Ý.com¶ºÒõ¹Ý's log is the first log from a Certificate Authority to be accepted and will be included in Chrome starting on February 1./blog/digicerts-certificate-transparency-log-approvedMon, 20 May 2024 12:56:37 UTCDigital Twins | ¶ºÒõ¹Ý.comAfter about thirty years of Internet of Things (IoT), aka ubicomp, pervasive computing and ambient intelligence, the know-how of creating, experiencing and sustaining emergent forms of combined physical and digital properties and characteristics, is still underdeveloped. Goods, persons, houses, situations and Industrial processes all radiate data and create digital twins.These twins exist as sets of properties in an analytic layer, which is in many hands at the moment, but not really under multi-stakeholder control. Whoever or whatever gains agency in and on that layer (which defines governance of the everyday) must grasp the practice and theory of assigning, withdrawing, validating and defining the very nature of entitlements; who/what/when/where exists how and why? /blog/digital-twinsTue, 30 Apr 2024 14:40:01 UTCDon't forget about DNS? | ¶ºÒõ¹Ý.comThe purpose of a DNS server is to translate what a user types into their browser into something a computer can understand and use to locate a website. Learn more about DNS here./blog/dont-forget-about-dnsTue, 30 Apr 2024 16:42:49 UTCDon't Get Caught by Phishing Scams | ¶ºÒõ¹Ý.comOver 500 million phishing emails make it to users' inboxes everyday. Learn phishing methods, common phishing characteristics, and tips for avoiding a phishing attack./blog/dont-get-caught-phishing-scamsFri, 24 May 2024 16:24:37 UTCPreventing the DROWN Attack | ¶ºÒõ¹Ý.comResearchers recently uncovered the DROWN vulnerability in SSL v2. DROWN stands for Decrypting RSA with Obsolete and Weakened eNcryption./blog/drown-attack-ssl-v2Tue, 30 Apr 2024 15:31:11 UTCDuplicate Emails Regarding Deprecation of 3-Year Certificates | ¶ºÒõ¹Ý.comEffective March 1, 2018, 3-year (and longer term) certificates have been deprecated by the CA/Browser Forum Ballot 193. Going forward, any public-facing SSL/TLS certificate can have a maximum lifespan of 825 days./blog/duplicate-emails-regarding-deprecation-3-year-certificatesTue, 30 Apr 2024 17:41:00 UTCEmail address transition from Symantec to ¶ºÒõ¹Ý | ¶ºÒõ¹Ý.com¶ºÒõ¹Ý provided notification regarding changing the email address domain name in the validation emails we send. (e.g., validation@symantec.com to validation@digicert.com ). We would like to inform you that this went live on 31 August 2018. Symantec Corporation asked us to imminently transition the remaining email addresses we use away from @symantec.com domain. To meet this, we also had to transition our order management emails (e.g., isporders@symantec.com to isporders@digicert.com ) along with the validation email changes on 31 August 2018. This ensures that going forward all order management and validation emails that were coming from @symantec.com email addresses will be coming from @digicert.com email addresses./blog/email-address-transition-from-symantec-to-digicertMon, 20 May 2024 13:48:37 UTCEmployee Education Key to Strong Enterprise Security | ¶ºÒõ¹Ý.comEmployees who are uneducated about best security practices can be a vulnerability to enterprises and are the leading cause of company security breaches./blog/employee-education-key-to-strong-enterprise-securityFri, 12 Sep 2025 19:16:08 UTCEmployee Negligence Is a Leading Cause of Your Company¡¯s Security Risk | ¶ºÒõ¹Ý.comMost employees know the risks associated with questionable security behaviors, but there is still lack of motivation to be cautious about online behaviors./blog/employee-negligence-cause-security-riskFri, 12 Sep 2025 19:27:06 UTCEmployees Are First Line of Defense for Cyber-Attacks | ¶ºÒõ¹Ý.comCybersecurity awareness and dedication to best practices needs to start at the top of an organization and trickle down to the low-level employees./blog/employees-are-first-line-defense-for-cyber-attacksTue, 5 Mar 2024 18:03:58 UTCEmployees Still the Biggest Threat to Enterprise Security | ¶ºÒõ¹Ý.comEmployees are the first line of defense in enterprise security, but bad habits make them an easy target for cybercriminals to access sensitive information./blog/employees-still-the-biggest-threat-to-enterprise-securityMon, 20 May 2024 18:30:37 UTCEMV Cards: What¡¯s the Chip and Who¡¯s Liable Now? | ¶ºÒõ¹Ý.comEMV cards are here to stay. With the recent liability shift, retailers will now have to adapt their hardware to make using chip technology more accessible./blog/emv-cards-what-is-chip-and-who-is-liableTue, 30 Apr 2024 14:47:42 UTCEncryption and decryption ¨C the never-ending battle | ¶ºÒõ¹Ý.comThe importance of cryptographic algorithms for day-to-day information security is an undeniable necessity with the expansion of the internet and the escalating volumes of sensitive data exchanged online every day./blog/encryption-decryption-the-never-ending-battleMon, 20 May 2024 13:53:37 UTCThe Endpoint: A Leading Security Concern | ¶ºÒõ¹Ý.comEndpoints, they say, are the greatest security risk because they require a uniquely delicate balance of security and productivity./blog/endpoint-leading-security-concernMon, 20 May 2024 11:59:37 UTCHow the Green Bar in Extended Validation SSL Was Born | ¶ºÒõ¹Ý.comEV SSL Certificates are impossible to forge, giving enterprises using Extended Validation SSL Certificates instant anti-phishing indication of online trust./blog/enterprise-benefits-extended-validation-sslMon, 20 May 2024 12:01:37 UTCEnterprise Defense From Security Threats, Cyber Attacks, and Data Leakage | ¶ºÒõ¹Ý.comEnterprise data security today must address the growing sophistication of attacks and innovative methods to gain access to confidential information./blog/enterprise-defense-vulnerabilities-cyber-attacks-data-breachesMon, 22 Apr 2024 15:34:01 UTCWhy Enterprises Must Implement Mobile Security | ¶ºÒõ¹Ý.comThe use of mobile devices is present in virtually every organization. Employ proper mobile security to keep corporate data out of cybercriminal hands./blog/enterprises-must-implement-mobile-securityMon, 20 May 2024 17:46:37 UTCEOS of CWS/MSSL, plus domain-related changes | ¶ºÒõ¹Ý.comChanges are coming for resellable Symantec? branded Enterprise offerings and Symantec web addresses. Read the details below so you can be ready to meet the expectations of your customers and ensure continuity for your revenue stream and operations./blog/eos-of-cws-mssl-plus-domain-related-changesThu, 25 Apr 2024 17:42:47 UTCETSI Recommendations Echo Global Push for IoT Security | ¶ºÒõ¹Ý.comETSI recommendations push global IoT security standards. The massively growing number of IoT devices has pressed standards bodies and government entities to publish security guidelines and recommendations./blog/etsi-recommendations-push-global-iot-security-standardsMon, 22 Apr 2024 17:08:48 UTCEV Certificates & ¶ºÒõ¹Ý | ¶ºÒõ¹Ý.comSharing our view on EV issuance may help others understand the stances ¶ºÒõ¹Ý takes with respect to EV certificate issuance and the future of EV. Some of these stances are not currently supported in the EV requirements and are features specific to ¶ºÒõ¹Ý./blog/ev-certificates-digicertWed, 28 Feb 2024 09:44:42 UTCWebsite authentication for financial institutions | ¶ºÒõ¹Ý.comWhy are EV SSL certificates still crucial for Financial Institutions and Banks? Security Leader ¶ºÒõ¹Ý plans to propose additional improvements to the EV standards in the months to come.?/blog/ev-ssl-certificates-qwacs-for-financial-institutionsTue, 30 Apr 2024 15:56:00 UTCThe Evolution of SSL and TLS | ¶ºÒõ¹Ý.comSecure Sockets Layer (SSL) and Transport Security Layer (TLS) are protocols used to encrypt communications between a web server and a user¡¯s web browser./blog/evolution-of-sslMon, 20 May 2024 11:39:37 UTCFix for an Expired Intermediate SSL Certificate Chain | ¶ºÒõ¹Ý.comAn expired intermediate certificate can cause errors to users with local copies of the certificate. The cert is unnecessary and can be safely deleted./blog/expired-intermediate-certificateThu, 23 May 2024 17:33:50 UTCLosing ground: Exploring the huge cost of not prioritizing IoT security | ¶ºÒõ¹Ý.comThe Internet of Things (IoT) is ramping up, with 92 percent of companies saying it will be extremely important in the next two years. Yet, companies not prioritizing security for their IoT deployments may face significant losses upwards of tens of millions of dollars. The State of IoT Security Survey explores security behaviors and common practices among the best companies./blog/exploring-cost-of-not-prioritizing-iot-securityFri, 24 May 2024 15:51:01 UTCFake Customer Support Scams Target Enterprise Networks | ¶ºÒõ¹Ý.comPhishing scams have evolved into fake customer support portals stealing user logins to attack enterprise networks and steal valuable resources./blog/fake-customer-support-enterprise-riskMon, 20 May 2024 13:45:37 UTCFaster, Better, Smarter: One-Click CSR | ¶ºÒõ¹Ý.comIn the world of SSL Certificates, CSR creation and installation historically are not synonymous with fast and simple.?/blog/faster-better-smarter-one-click-csrWed, 3 Apr 2024 12:18:21 UTCFBCA Cross-Signing Authority Now Required for Directed Exchange | ¶ºÒõ¹Ý.comThe federal government is now requiring FBCA cross-certified certificates for any company exchanging electronic health records a federal agency./blog/fbca-cross-signing-authority-now-required-directed-exchangeFri, 10 May 2024 17:49:37 UTCFirefox 32 Supports Public Key Pinning | ¶ºÒõ¹Ý.comPublic Key Pinning protects users against man-in-the-middle attacks and even mis-issued certificates./blog/firefox-32-supports-public-key-pinningThu, 25 Apr 2024 17:16:04 UTCFour Essential Components of Certificate Lifecycle Management | ¶ºÒõ¹Ý.comWe're committed to providing solutions for enterprises that need platforms and tools for effective SSL Certificate management./blog/four-components-certificate-lifecycle-managementFri, 20 Jun 2025 16:30:10 UTCThe Fraud Problem with Free SSL Certificates | ¶ºÒõ¹Ý.comNot all SSL Certificates are created equal. Learn the differences between DV, OV, and EV SSL Certificates./blog/fraud-problem-with-free-ssl-certificatesThu, 11 Sep 2025 20:43:16 UTCFREAK Attack: What You Need to Know | ¶ºÒõ¹Ý.comThe FREAK attack does not affect SSL Certificates, but admins should disable export-grade ciphers on all servers./blog/freak-attack-need-knowTue, 27 Feb 2024 15:44:47 UTCGoogle CT to Expand to All Certificates Types | ¶ºÒõ¹Ý.comGoogle announced that all certificate types including EV, OV, and DV must comply with Certificate Transparency (CT) policy starting October 2017./blog/google-certificate-transparency-expand-to-all-certificate-typesTue, 30 Apr 2024 17:42:14 UTCGoogle Gives SSL-Secured Sites Search Ranking Boost | ¶ºÒõ¹Ý.comGoogle has started giving an SEO rank boost to SSL-enabled Websites that utilize HTTPS everywhere for safer browsing and secure online data./blog/google-gives-ssl-secured-sites-search-ranking-boostMon, 20 May 2024 19:04:37 UTCGoogle Plans to Deprecate DHE Cipher Suites | ¶ºÒõ¹Ý.com?Google announced in a blog post?plans to deprecate DHE-based cipher suites. This announcement follows several noteworthy browser security advancements./blog/google-plans-to-deprecate-dhe-cipher-suitesMon, 20 May 2024 12:25:37 UTCGoogle Takes Another Step to Help Encourage HTTPS Everywhere | ¶ºÒõ¹Ý.comChrome Security Panel in DevTools demystifies what connection errors keep you away from the green padlock./blog/google-takes-another-step-to-help-encourage-https-everywhereTue, 30 Apr 2024 17:26:47 UTCGrid Computing Security Experts Meet at ¶ºÒõ¹Ý | ¶ºÒõ¹Ý.comThanks to grid computing and the identity authentication and encryption provided by organizations like ¶ºÒõ¹Ý, scientists and researchers from around.../blog/grid-computing-security-experts-meet-at-digicertFri, 24 May 2024 15:37:37 UTCGuidance for the EFAIL S/MIME Vulnerability | ¶ºÒõ¹Ý.comLearn about the latest EFAIL S/MIME vulnerability. FYI, it does not compromise private keys. Instead, it leverages flaws in how email clients parse emails to retrieve emails that have already been decrypted. You do not need to reissue your S/MIME certificates or private keys to protect yourself from this vulnerability./blog/guidance-for-the-efail-smime-vulnerabilityFri, 15 Jul 2022 20:53:57 UTCHackers: The Internet's Immune System | ¶ºÒõ¹Ý.comMost experts will argue that hacking has an integral role in the health of our Internet security, and that without it, information security will suffer./blog/hackers-are-internet-immune-systemThu, 7 Mar 2024 15:54:35 UTCHealth Canada Guidance for Medical Device Cybersecurity is a Welcome Development | ¶ºÒõ¹Ý.comHealth Canada released a guidance document for pre©\market requirements for medical device cybersecurity. Cybersecurity presents multiple risks to healthcare providers and device manufacturers - read more on ¶ºÒõ¹Ý.com/blog/health-canada-premarket-requirements-medical-device-cybersecurityThu, 25 Apr 2024 17:41:35 UTCHealthcare: From Privacy to Security | ¶ºÒõ¹Ý.comWe have focused too long on privacy issues, & while important, privacy doesn¡¯t matter if your data isn¡¯t secure./blog/healthcare-privacy-to-securityMon, 27 May 2024 16:23:37 UTCHeartbleed and the Problem of NotBefore Date | ¶ºÒõ¹Ý.comThere are several online Heartbleed detection tools that rely solely on checking the NotBefore Data. There are major flaws with this approach./blog/heartbleed-and-the-notbefore-dateFri, 10 May 2024 17:12:37 UTCWhat is Heartbleed? And What You Can Do About It | ¶ºÒõ¹Ý.comA bug in the software servers use to create secure connections leaves sites open to exploits allowing attackers to obtain sensitive data from secured sites./blog/heartbleed-openssl-fixMon, 27 May 2024 16:21:37 UTCGlobal Partner Series: How 1&1 Internet is Automating the Deployment of SSL to Every Customers¡¯ Site | ¶ºÒõ¹Ý.com¡°With ¶ºÒõ¹Ý, we had a partner at our side where we could solve this whole process, which is full of challenges, in a very scalable and efficient way.¡± Watch Robin Rudat, ¶ºÒõ¹Ý, VP, Head of Domains and Productivity, 1&1 Internet talk about protecting the customers and their customers. /blog/how-1-and-1-internet-is-automating-the-deployment-of-sslFri, 10 May 2024 17:47:37 UTCHow Effective Authentication Protects You Online | ¶ºÒõ¹Ý.comGood security requires effective authentication on top of encryption in order to succeed. User authentication is an essential component of security./blog/how-effective-authentication-protects-you-onlineTue, 30 Apr 2024 14:17:03 UTCHow Eonti & ¶ºÒõ¹Ý Eliminate IoT Security Blind Spots | ¶ºÒõ¹Ý.com¡°When you look at the requirements that critical infrastructure customers need¡ª24/7/365 physical security, customer support, global infrastructures, all of that together¡ªfor us it¡¯s always ¶ºÒõ¹Ý.¡± Eonti provides consulting, strategy, governance, technology, and lifecycle operations for Trust Management and Public Key Infrastructure (PKI). The team is led by Eonti Founder and CEO Oscar Marcia, a former 15-year VP of Security for CableLabs. Oscar has built a team with extensive first-hand expertise in working with the organizations that lead Homeland Security¡¯s critical infrastructure sectors, including transportation (aviation and automotive), communications (cable, satellite, and wireless), healthcare, and IoT industries. Eonti partners with ¶ºÒõ¹Ý to bring IoT security to all critical infrastructure deployments./blog/how-eonti-digicert-eliminate-iot-security-blind-spotsTue, 30 Apr 2024 14:33:09 UTCNew CA/B Forum Proposal to Shorten Certificate Lifetimes: Will It Improve Security? | ¶ºÒõ¹Ý.comThere was a proposal in 2017 to reduce the maximum lifetime of an SSL TLS certificate to one year, which was soundly defeated. Now, the same proposal is being made again. What is behind these proposals, and do they do anything to increase the security of digital certificates?/blog/how-reduced-tls-ssl-certificate-lifetimes-to-one-year-would-affect-youThu, 23 May 2024 17:26:37 UTCHow to Avoid Cyberattacks While Working from Home | ¶ºÒõ¹Ý.comHow to Avoid COVID-19 Cyberattacks. Amidst the pandemic of COVID-19, attackers are taking advantage of the alertness of the world population with phishing emails, social media posts, apps and text messages containing malware./blog/how-to-avoid-covid-19-cyberattacksFri, 12 Sep 2025 16:25:06 UTCHow to Build a PKI That Scales: Automation [SME Interview] | ¶ºÒõ¹Ý.comIn ¶ºÒõ¹Ý's fourth and final interview on building a scalable PKI, we ask how we should automate certificate management. Let¡¯s recap the series: We started by giving you a high-level overview of some of the critical PKI use cases. We then delved into the difference between public and private PKI. Next, we presented information to help you figure out whether your private PKI should use a hosted or internal CA. Now, we move on to considerations for automating certificate management to turn your PKI into an efficient machine./blog/how-to-build-a-pki-that-scales-automationWed, 3 Apr 2024 12:03:49 UTCHow to Build a PKI That Scales: Hosted vs. Internal [SME Interview] | ¶ºÒõ¹Ý.comPKI architect Darin Andrew discusses how organizations choose between a hosted or internal PKI solution in part three of this series./blog/how-to-build-a-pki-that-scales-hosted-versus-internalThu, 11 Sep 2025 15:00:16 UTCHow to Build a PKI That Scales: Public vs. Private [SME Interview] | ¶ºÒõ¹Ý.comWe ask our senior PKI architect about the differences between public and private PKI, and learn how top enterprises have built PKIs that scale successfully./blog/how-to-build-a-pki-that-scales-private-vs-publicMon, 22 Apr 2024 16:59:52 UTCHow to Choose the Right Type of TLS/SSL Certificate | ¶ºÒõ¹Ý.comHow to choose the right type of TLS/SSL certificate and what kind of SSL certificate do I need? What type of SSL certificate should I get? Here we take you through the types of SSL certificates, how they work and how to choose the right one for your needs./blog/how-to-choose-the-right-type-of-tls-ssl-certificateThu, 11 Sep 2025 20:54:11 UTCHow to Improve your Organization's Crypto-Agility | ¶ºÒõ¹Ý.comHow to Improve your Crypto-Agility. Securing devices and applications and becoming ¡°crypto agile¡± is fundamental to an organization¡¯s effort to stay secure as the number of IoT devices increase in world full of quantum computers./blog/how-to-improve-your-crypto-agilityMon, 22 Apr 2024 15:24:01 UTCHow to Keep your Online Banking Info Secure | ¶ºÒõ¹Ý.comMobile and online banking have been on the rise in recent years. From 1995 to 2015 the number of physical banks dropped by nearly half. Many banks are urging customers to take advantage of online banking services. But the higher usage of online services also increases the risk of cybercrimes. Some tips to stay secure include avoiding use of public WIFI, check for TLS/SSL encryption on the sites you visit, use VPN where possible, maintain strong passwords, use multi-factor authentication, download your bank's app, check your privacy settings and avoid disclosing private information, such as transactions, via these apps./blog/how-to-keep-your-online-banking-info-secureTue, 30 Apr 2024 17:28:26 UTCShould I Buy from This Site? How to Know if a Website is Secure | ¶ºÒõ¹Ý.comHow to know if a website is secure and safe. With the holiday season coming up, many people are doing their shopping online. But how do you know if a site is secure?/blog/how-to-know-if-a-website-is-secureTue, 30 Apr 2024 14:27:27 UTCHow to Maintain Trust in Your Symantec-Issued Certificates | ¶ºÒõ¹Ý.comJeremy Rowley, EVP of Product at ¶ºÒõ¹Ý, answers common questions about how customers can maintain trust in their Symantec-issued certificates./blog/how-to-maintain-trust-in-your-symantec-issued-certificatesTue, 30 Apr 2024 15:47:14 UTCHow To Reissue 3-Year Certificates Without Losing Lifetime | ¶ºÒõ¹Ý.comDue to CAB forum baseline requirements, we are no longer able to issue certificates with a lifetime of more than 825 days. We've provided an example to help you understand how to get the maximum lifetime of your 3-year certificates./blog/how-to-reissue-3-year-certificates-without-losing-lifetimeTue, 30 Apr 2024 15:18:43 UTCHow to Set Up DMARC to Qualify Your Domain for VMC | ¶ºÒõ¹Ý.comIn our last post, we discussed how to get your brand logo into the correct format for BIMI/VMC (Verified Mark Certificates). This post will tackle the next step: how to set up DMARC for your organization./blog/how-to-set-up-dmarc-to-qualify-your-domain-for-vmcFri, 13 Dec 2024 20:34:47 UTCLack of Encryption, Authentication Led to HTTP Deprecation | ¶ºÒõ¹Ý.comThe major deficiencies in the HTTP protocol led Google and Mozilla to announce their plans to deprecate HTTP in Chrome and Firefox./blog/http-deprecationThu, 4 Apr 2024 15:44:26 UTCHTTPS-Only Features in Major Browsers | ¶ºÒõ¹Ý.comGain some background information about HTTPS-only features and see a list of current and future features that require a secure connection./blog/https-only-features-in-browsersThu, 11 Sep 2025 20:45:21 UTCFor IBM, identity has become the new perimeter defense. | ¶ºÒõ¹Ý.comWatch Weber Yuan, Ph.D, Lead Architect, CIO, Identity Services & Information Security, IBM discuss the new digital landscape and how Software as a Service models are disrupting the traditional approach to user security. Companies need universal, scalable IT services¡ªanywhere and everywhere their users need those services to stay productive and connected within a distributed global environment. IBM¡¯s CIO Office (which is essentially the company¡¯s functioning IT Department), in partnership with ¶ºÒõ¹Ý, has developed an innovative solution. /blog/ibm-uses-identity-as-a-shield-identity-has-become-our-new-perimeter-defenseTue, 30 Apr 2024 14:05:22 UTCThe Impact of a Root Certificate Expiration | ¶ºÒõ¹Ý.comThe Impact of a Root Certificate Expiration. What is a root certificate? How do root certificates work? In the chain of trust, a root certificate is the first link. Unlike other certificates, it is self-signed, meaning the issuer and subject are the same./blog/impacts-of-root-certificate-expirationThu, 25 Apr 2024 17:28:08 UTCImplementing Security in the Internet of Things | ¶ºÒõ¹Ý.comManufacturers should take responsibility for the encryption and authentication of IoT devices./blog/implementing-security-in-the-internet-of-thingsTue, 30 Apr 2024 15:39:58 UTCImportant Service Announcement 5 June 2018 | ¶ºÒõ¹Ý.comThis communication contains important updates regarding ¶ºÒõ¹Ý customers' implementations of Complete Website Security (CWS) and Managed PKI for SSL (MSSL) products and services. The following MSSL and CWS enhancement is planned for release on 30 June 2018./blog/important-service-announcement-5-june-2018Mon, 29 Apr 2024 14:46:17 UTCImproper Employee Access Compromises Healthcare Organizations | ¶ºÒõ¹Ý.comA lack of rigid employee access policies could create potential breaches within a healthcare organization./blog/improper-employee-access-compromises-healthcare-organizationsThu, 25 Apr 2024 18:07:28 UTCIndian CA Issues Rogue Certificates: What ¶ºÒõ¹Ý is Doing About It | ¶ºÒõ¹Ý.comThe rogue certificates issued by the NIC demonstrate the need for regional CAs to be held to the same standard as globally trusted CAs./blog/indian-ca-issues-rogue-certificates-digicertsMon, 29 Apr 2024 12:30:50 UTCInfographic: Infosec Security Trends 2015 | ¶ºÒõ¹Ý.comLearn about infosec security trends for SSL Certificate management this year in an infographic./blog/infographic-infosec-security-trends-2015Fri, 12 Sep 2025 17:50:28 UTCIntegrations and Improvements Continue | ¶ºÒõ¹Ý.comNow that we are officially ¶ºÒõ¹Ý, expect improvements to continue. In August, we will switch over from @digicert.com email addresses and look to complete migration by the end of the year. ¶ºÒõ¹Ý is upgrading its telephony system, too. Our Encryption Everywhere program is being moved onto our CertCentral platform, which can offer all the functionality of the current platform but can scale to additional functionality such as reporting. We¡¯re confident you¡¯ll love it ¨C and we¡¯ll keep you updated as we move towards that. As part of the integration of former Website Security infrastructure, and to modernize and streamline our code signing certificate offerings, we will be updating our code signing PKI hierarchy later this year. We intend to issue all new code signing certificates from ¶ºÒõ¹Ý¡¯s hierarchy by 31 October 2018. /blog/integrations-and-improvements-continueFri, 24 May 2024 15:34:37 UTCThe Internet of Things: Security Issues that Need Resolutions | ¶ºÒõ¹Ý.comSecurity threats in the Internet of Things are already being discovered¡ªand they're more dangerous than you think./blog/internet-things-security-issues-need-resolvingThu, 23 May 2024 17:37:37 UTCIntro to Penetration Testing: A Four-Part Series | ¶ºÒõ¹Ý.comAn easy-to-understand introduction to penetration testing that reviews pentesting methodologies and reasons for pentesting./blog/introduction-penetration-testing-four-part-seriesFri, 24 May 2024 15:09:37 UTCIoT and the Post-Password Internet | ¶ºÒõ¹Ý.comThe Internet of Things is quickly dissolving the need for alphanumeric passwords and changing the Internet as we know it./blog/iot-post-password-internetFri, 24 May 2024 15:42:37 UTCIoT: Prioritizing Security in Smart Clothing | ¶ºÒõ¹Ý.comAs IoT wearables become more advanced, high-quality security becomes a higher priority./blog/iot-prioritizing-security-smart-clothingMon, 4 Mar 2024 16:19:47 UTCIoT Security as a Marketing Advantage in Automotive Tech | ¶ºÒõ¹ÝFrom autonomous driving to over-the-air (OTA) updates, the modern car is no longer just a vehicle¡ªit¡¯s a complex IoT device on wheels. /blog/iot-security-as-a-marketing-advantageFri, 16 May 2025 12:30:35 UTCIoT Security: When Fiction Becomes Reality - Part I | ¶ºÒõ¹Ý.comIt¡¯s up to the infosec community to reach out to engineering and manufacturing and to help them understand security risks and best practices. We need to engage in conversation. We need to gain a seat at the table so that security is not an afterthought in the era of connectivity./blog/iot-security-fiction-becomes-reality-partMon, 20 May 2024 11:47:37 UTCIoT Security: When Fiction Becomes Reality ¨C Part II | ¶ºÒõ¹Ý.comIn my last post, I¡¯d like to address how infosec professionals can help non-security folks understand the need for security basics./blog/iot-security-fiction-becomes-reality-part-iiThu, 18 Apr 2024 18:06:24 UTCIntro to Penetration Testing Part 3: It Could Happen to You | ¶ºÒõ¹Ý.comFour reasons small businesses need to do pentesting and improve their data security practices./blog/it-could-happen-to-youFri, 5 Sep 2025 16:01:46 UTCJoin ¶ºÒõ¹Ý¡¯s Dean Coclin to capitalize on upcoming trends | ¶ºÒõ¹Ý.comPlan to stay ahead of what¡¯s happening in the industry and marketplace by attending our Trends in TLS and SSL webinar. The webinar is available FREE to you and your employees, live or on-demand, on the BrightTalk network. Join us to gain timely awareness of the ongoing and upcoming trends in the digital certificate ecosystem, including TLS, SSL, PKI, and document/code signing certificates. Leverage what you learn to add value and heightened relevance to your customers and prospects./blog/join-digicerts-dean-coclin-to-capitalize-on-upcoming-trendsMon, 30 Jun 2025 18:44:43 UTCJoin me at our Q2 2019 Trends in TLS, SSL and identity webinar | ¶ºÒõ¹Ý.comThe benefit of being a ¶ºÒõ¹Ý Certified Partner is that we want you to be leaders, too. To help you achieve and maintain your leadership, we provide a quarterly update on what¡¯s happening in the industry and marketplace ¨C and we want to see you there. Please attend our Latest Trends in TLS and SSL webinar, available FREE - live or on-demand on the BrightTalk network. /blog/join-me-at-our-q2-2019-trends-in-tls-ssl-and-identity-webinarFri, 10 May 2024 14:54:18 UTCKeeping Track of Changes in Chrome for HTTPS & HTTP Indicators | ¶ºÒõ¹Ý.comChrome¡¯s security UI has evolved both in response to the increased adoption of HTTPS, and to further encourage it. This post will help you keep track of what indicators look like today, and to plan for what they will be in the future./blog/keeping-track-of-changes-in-chrome-for-https-http-indicatorsFri, 12 Sep 2025 13:08:18 UTCKey Elements of a Disaster Recovery Plan | ¶ºÒõ¹Ý.comA disaster recovery plan is crucial in preparing businesses, large and small, to successfully work around an elemental disaster./blog/key-elements-of-a-disaster-recovery-planFri, 10 May 2024 16:25:44 UTCKey Takeaways from FDA Guidance on Medical Device Cybersecurity | ¶ºÒõ¹Ý.comThe FDA recently issued a draft guidance that outlines the important steps medical device manufacturers must take to address cybersecurity risks. ?/blog/key-takaways-from-fda-cybersecurity-guidanceFri, 10 May 2024 14:38:37 UTCKill the Fax Machine, Enable Secure Information Exchange | ¶ºÒõ¹Ý.comNew standards for secure information exchange is enabling compliance with federal health information requirements that previous technologies can't offer./blog/kill-the-fax-machineMon, 20 May 2024 13:41:37 UTCLastPass Hack and the Case for Two-factor Authentication | ¶ºÒõ¹Ý.comOn Monday, June 15, 2015, LastPass announced a security breach. Two-factor authentication is one proven method for protection when passwords are stolen./blog/lastpass-case-for-two-factor-authenticationFri, 10 May 2024 13:43:37 UTCLenovo¡¯s Superfish Adware and the Perils of Self-Signed Certificates | ¶ºÒõ¹Ý.comLenovo's violation of security best practices with the Superfish adware demonstrates the dangers of using self-signed certificates./blog/lenovos-superfish-adware-perils-self-signed-certificatesTue, 30 Apr 2024 16:35:13 UTCLogjam Attack: What You Need to Know | ¶ºÒõ¹Ý.comWhat Is the Logjam Attack? More Importantly, What Does It Do?/blog/logjam-attackMon, 20 May 2024 19:05:37 UTCA Look at Google's Accelerated Mobile Pages | ¶ºÒõ¹Ý.comIn early October Google announced its new project Accelerated Mobile Pages. The project has obvious benefits, but the concerns are valid as well./blog/look-at-googles-accelerated-mobile-pagesFri, 10 May 2024 18:15:37 UTCLooking beyond the Lock ¨C Reliable Identity in Today¡¯s Web Age | ¶ºÒõ¹Ý.comFor years, browsers used a mostly similar user interface (UI) to distinguish EV from other types of certificates. Several browsers have announced changes to the UI for EV certificates. Let¡¯s look at what has changed in each of the popular browsers./blog/looking-beyond-the-lock-reliable-identity-in-todays-web-ageMon, 22 Apr 2024 16:56:42 UTCMajor Browsers Announce RC4 Deprecation in Early 2016 | ¶ºÒõ¹Ý.comGoogle, Mozilla, and Microsoft have all made announcements to deprecate RC4 cipher suites. Admins should disable these ciphers now./blog/major-browsers-announce-rc4-deprecationMon, 22 Apr 2024 17:13:19 UTCMaking the Most of Vulnerability Scanners | ¶ºÒõ¹Ý.comChecking for vulnerabilities is not a simple process, but it is necessary. Follow these three tips for effective monitoring./blog/making-the-most-of-vulnerability-scannersThu, 11 Sep 2025 15:32:12 UTCEnterprise SSL Certificate Management: What You Need to Know | ¶ºÒõ¹ÝFrom SSL Certificate discovery and monitoring, to deployment and workflow management, enterprises need to evaluate their existing management platform./blog/managedpki-is-the-right-solution-for-enterprise-certificate-managementThu, 11 Sep 2025 19:08:37 UTCManaging Cyber Crime & Cybersecurity Budget | ¶ºÒõ¹Ý.comMany organizations don¡¯t conduct security audits or security practices to protect against security breaches that can cost a company thousands of dollars./blog/managing-cyber-crime-and-cybersecurity-budgetFri, 12 Sep 2025 16:08:43 UTC85% of Organizations Still Manage SSL Encryption with Spreadsheets | ¶ºÒõ¹ÝManaged PKI systems automate the discovery, deployment, and management of digital certificates eliminates downtime, enhances security, and increases trust./blog/managing-digital-certificate-securityMon, 20 May 2024 18:05:15 UTCDDoS Attacks: Mitigation Services | ¶ºÒõ¹Ý.comYour organization may feel comfortable mitigating a DDoS attack, but an expert could save you time and money. DDoS mitigation services offer that expertise./blog/mark-ddos-attacks-mitigation-servicesFri, 12 Sep 2025 14:05:32 UTCMark: What Criminals Are Really After | ¶ºÒõ¹Ý.com/blog/mark-what-criminals-are-really-afterFri, 7 May 2021 08:52:50 UTCMaximize Certificate Sales with the ¶ºÒõ¹Ý Reseller Partner Account | ¶ºÒõ¹Ý.com¶ºÒõ¹Ý makes selling certificates to your customers easy and hassle-free, and your company also gains residual benefits./blog/maximize-certificate-sales-with-digicert-reseller-partner-accountMon, 20 May 2024 13:50:37 UTCMeeting the General Data Protection Regulation (GDPR) | ¶ºÒõ¹Ý.com¶ºÒõ¹Ý is committed to data security and privacy, and we will be aligned with GDPR when it goes into effect on May 25, 2018. We also will be incorporating GDPR principles into our global standard for data handling, providing stronger data protections wherever we do business./blog/meeting-the-general-data-protection-regulation-gdprTue, 30 Apr 2024 16:40:46 UTCMicrosoft Announces New EV Code Signing Requirements | ¶ºÒõ¹Ý.comMicrosoft will require EV Code Signing Certificates for all applications. ¶ºÒõ¹Ý believes this change will enhance application security and online trust./blog/microsoft-announces-new-code-signing-requirementsTue, 30 Apr 2024 15:28:15 UTCMitigating Risk: The Importance of Considering Your Certificate Practices | ¶ºÒõ¹Ý.comWe often talk with developers who aren¡¯t aware of the options they have for designing their PKI and certificate policies. We dive into important considerations you should make to enhance your PKI./blog/mitigating-risk-considering-your-certificate-practicesThu, 4 Sep 2025 22:04:11 UTCWhy Mobile Banking Security Still Falls Short | ¶ºÒõ¹ÝAs mobile banking becomes the go-to for managing money, knowing how to spot the signs of an attack¡ªand more importantly, how to protect yourself./blog/mobile-banking-creates-serious-security-concernsFri, 4 Apr 2025 13:06:33 UTCMoving Beyond 1024-Bit Encryption | ¶ºÒõ¹Ý.comAn increase in computing power suggests that 1024-bit encryption is no longer secure enough to protect company private keys./blog/moving-beyond-1024-bit-encryptionFri, 5 Sep 2025 15:28:08 UTCMozilla to Add SHA-1 Security Warnings | ¶ºÒõ¹Ý.comMozilla is following Microsoft's SHA-1 deprecation timeline and adding SHA-1 security warnings to the Firefox Web Console and browser./blog/mozilla-add-sha-1-security-warningsMon, 20 May 2024 18:41:37 UTCMS SmartScreen and Application Reputation | ¶ºÒõ¹Ý.comEV Code Signing Certificates, along with MS SmartScreen technology, protect users from downloading infected applications and malware./blog/ms-smartscreen-application-reputationMon, 29 Apr 2024 14:16:17 UTCMyth: TLS Is Too Heavy for Low-Powered Devices | ¶ºÒõ¹Ý.comEnsuring the same robust security in low-powered IoT devices that is used in larger IoT devices might be a challenge, but it can be done./blog/myth-of-tls-too-heavy-for-low-powered-devicesMon, 22 Apr 2024 17:23:22 UTCNational Cyber Security Awareness Month: October 2024?| ¶ºÒõ¹ÝNational Cybersecurity Awareness Month (NCSAM) is a collaborative initiative between the government and private industry in the United States and European Union/blog/national-cyber-security-awareness-monthFri, 5 Sep 2025 15:21:12 UTCIf You Connect It, Protect It - Cybersecurity Awareness Month | ¶ºÒõ¹Ý.comThis October marks the 17th year of the National Cyber Security Awareness Month (NCSAM), a U.S. collaborative effort between government and industry to promote safe and secure Cyber Security practices online./blog/national-cyber-security-awareness-month-connect-and-protectTue, 30 Apr 2024 16:29:58 UTCNetworking4All + ¶ºÒõ¹Ý: Putting the Future of the Customer First | ¶ºÒõ¹Ý.comNetworking4All + ¶ºÒõ¹Ý. The biggest challenge today is that companies don¡¯t think they¡¯re at risk. In ¶ºÒõ¹Ý, Networking4All has found a partner that shares the customer-first focus and the perspective to be ready for the post-quantum changes ahead./blog/networking4all-digicert-putting-the-future-of-the-customer-firstMon, 20 May 2024 18:10:37 UTCNew CAA Requirement: What You Should Know | ¶ºÒõ¹Ý.comMandatory CAA record checking will add another verification check for CAs prior to issuing a certificate. Learn about the benefits and concerns./blog/new-caa-requirement-2Thu, 25 Apr 2024 17:25:44 UTCNew CAB Forum Validation Rules Go Into Effect Today | ¶ºÒõ¹Ý.comAs of August 1, 2018, Certificate Authorities (CAs) are not allowed to use Methods #1 and #5 from section 3.2.2.4 of the Baseline Requirements to validate domain ownership when issuing publicly trusted certificates for use on the web./blog/new-cab-forum-validation-rules-go-into-effect-todayMon, 20 May 2024 13:55:37 UTCThe New Kid on the BlockChain | ¶ºÒõ¹Ý.com¶ºÒõ¹Ý announced joining Linux Foundation and consequently Hyperledger. Additionally, we made an announcement of becoming a steward for Sovrin Foundation. Our efforts in both verticals is to protect identities on blockchain platforms in order to provide a safer environment for our customers and other users of the web while using blockchain platforms./blog/new-kid-on-the-blockchainThu, 23 May 2024 16:10:37 UTCThe New Reality of Information Security | ¶ºÒõ¹Ý.comBruce Potter talks about the new reality of information security and its evolution to cyber security at ShmooCon 2015./blog/new-reality-information-securityThu, 18 Apr 2024 18:12:59 UTCNew Report Gives Recommendations for Integrating Security into DevOps | ¶ºÒõ¹Ý.comToday, ¶ºÒõ¹Ý announced results from the 2017 Inviting Security into DevOps Survey./blog/new-report-gives-recommendations-integrating-security-devopsMon, 29 Apr 2024 12:12:47 UTCNew Security Solutions Emerge as IoT Moves into the Public Spotlight | ¶ºÒõ¹Ý.comUser privacy and security still need to be addressed in the Internet of Things. Is new technology or new restrictions the answer? Learn more./blog/new-security-solutions-emerge-iot-in-public-spotlightFri, 10 May 2024 15:50:37 UTCA New Way to Check for Chrome Distrust & Other Product Updates | ¶ºÒõ¹Ý.comThe upcoming deadline for Chrome 66 distrust is approaching quickly, so we recommend taking action as soon as possible on any affected certificates. Use our new tool to check your domain(s)./blog/new-way-to-check-for-chrome-distrustWed, 20 Mar 2024 13:01:34 UTCThe Next Generation of SecureWiFi Certificates Is Here | ¶ºÒõ¹Ý.com¶ºÒõ¹Ý now offers Wi-Fi Alliance-Compliant OSU Server Certificates/blog/next-generation-secure-wifi-certificatesWed, 7 Sep 2022 17:09:51 UTCNine Tips to Securely Work from Home | ¶ºÒõ¹Ý.comSince the World Health Organization declared COVID-19 a pandemic, many companies are asking their employees to work from home. Here are Nine Tips to Securely Work from Home During Coronavirus from ¶ºÒõ¹Ý./blog/nine-tips-to-securely-work-from-home-during-coronavirusMon, 20 May 2024 19:06:37 UTCNIST¡¯s ¡°Mitigating IoT-Based Distributed Denial of Service¡± Study | ¶ºÒõ¹Ý.comThe explosive growth of Internet of Things (IoT)-based devices has been a boon for manufacturers and consumers. There seems to be no end to the variety of products we can bring online. Accordingly, manufacturers often skip adding necessary security. This results in poorly secured devices (toys, cameras, monitors, watches, etc.) that can be taken over by hackers. NIST¡¯s National Cybersecurity Center of Excellence (NCCoE) has embarked on a study to improve the security of these devices and strengthen the resiliency of businesses. The NCCoE aims to ¡°improve the resilience of IoT devices against distributed attacks and expand the service availability characteristics of the Internet by mitigating the propagation of attacks across the network.¡± /blog/nists-mitigating-iot-based-distributed-denial-of-service-studyTue, 30 Apr 2024 16:10:10 UTCNo more unnecessary password changes for Certificate Authorities | ¶ºÒõ¹Ý.comAfter over a year of effort, Ballot SC3 was just unanimously passed by the CA/Browser Forum. It contains one is especially important change: removing the requirement that passwords be changed every 90 days./blog/no-more-unnecessary-password-changes-for-certificate-authoritiesFri, 12 Sep 2025 19:14:17 UTCSeeing a ¡°Not Secure¡± Warning in Chrome? Here¡¯s Why and What to Do about It | ¶ºÒõ¹Ý.comWhat does it mean when a website or your connection is not secure? Google Chrome browser, version 68, introduced a ¡°Not Secure¡± warning in the address bar that appears when you're visiting an insecure web page. See what you need to do if you come across this warning./blog/not-secure-warning-what-to-doThu, 11 Sep 2025 19:47:34 UTCNotice of Withdrawal from the CA Security Council | ¶ºÒõ¹Ý.com¶ºÒõ¹Ý is electing to withdraw from the CA Security Council (CASC) as we believe CASC is moving in a direction that ¶ºÒõ¹Ý does not support. Read more./blog/notice-of-withdrawal-from-the-ca-security-councilMon, 20 May 2024 13:54:37 UTC¶ºÒõ¹Ý Now Validating & Issuing SSL/TLS Certificates for Symantec Customers | ¶ºÒõ¹Ý.comSymantec-issued certificates do not need to be replaced now, during the busy holiday season, but will need to be replaced starting in 2018./blog/now-validating-issuing-ssl-certificates-for-symantecMon, 20 May 2024 17:55:37 UTCUnderstanding OCSP Times and What They Mean for You | ¶ºÒõ¹Ý.comWhat is OCSP & why does it matter? Learn the answers to these questions as well as why OCSP response times & uptimes can make or break your website./blog/ocsp-times-and-what-they-mean-for-youMon, 20 May 2024 18:55:37 UTCOfficial List of Trusted Root Certificates on Android | ¶ºÒõ¹Ý.comSimilar to other platforms like Windows and macOS, Android maintains a system root store that is used to determine if a certificate issued by a particular Certificate Authority (CA) is trusted. As a developer, you may want to know what certificates are trusted on Android for compatibility, testing, and device security./blog/official-list-trusted-root-certificates-androidFri, 5 Apr 2024 16:38:53 UTC.Onion Officially Recognized as Special-Use Domain | ¶ºÒõ¹Ý.com.Onion now classified as a special-use, top-level domain by Internet Engineering Steering Group (IESG)./blog/onion-officially-recognized-special-use-domainFri, 24 May 2024 15:55:58 UTCIn Online Security, Who Can You Trust? | ¶ºÒõ¹Ý.comUsing the free Certificate Inspector, administrators can quickly identify all SSL Certificates on a network and simplify certificate lifecycle management./blog/online-security-can-trustMon, 20 May 2024 11:44:04 UTCOpenSSL Patches 14 Security Vulnerabilities | ¶ºÒõ¹Ý.comThe OpenSSL vulnerabilities identified today do not affect SSL/TLS Certificates, but admins should make time to patch as soon as possible./blog/openssl-patches-14-security-vulnerabilitiesMon, 20 May 2024 12:54:37 UTCOpenSSL Patches ¡°Critical¡± & ¡°Moderate¡± Security Vulnerabilities | ¶ºÒõ¹Ý.comOpenSSL issued two patches this morning. One for a "critical" vulnerability, one for a "moderate" vulnerability. Admins should patch the framework ASAP./blog/openssl-patches-critical-and-moderate-vulnerabilitiesMon, 29 Apr 2024 12:46:57 UTCOpenSSL Patches "HIGH" Security Vulnerability in 1.1.0 | ¶ºÒõ¹Ý.comThese vulnerabilities do not affect SSL/TLS certificates, but system admins should patch their 1.1.0 OpenSSL framework as soon as possible./blog/openssl-patches-security-vulnerabilities-in-opensslMon, 27 May 2024 16:24:37 UTCOpenSSL Patches Seven Security Vulnerabilities | ¶ºÒõ¹Ý.comOpenSSL released two patches¡ªversions 1.0.2g and 1.0.1s¡ªfor seven new security vulnerabilities that were found in OpenSSL versions 1.0.1 and 1.0.2./blog/openssl-patches-seven-security-vulnerabilitiesMon, 20 May 2024 13:40:37 UTCOpenSSL Patches Six Security Vulnerabilities | ¶ºÒõ¹Ý.comNew OpenSSL security vulnerabilities do not affect SSL Certificates. System administrators should update OpenSSL as soon as patches are available./blog/openssl-patches-six-security-vulnerabilitiesMon, 27 May 2024 16:44:37 UTCOpenSSL Patches 3 Security Vulnerabilities in OpenSSL 1.1.0 | ¶ºÒõ¹Ý.comThe vulnerabilities do not affect SSL/TLS certificates but sysadmins should make plans to patch their OpenSSL framework as soon as possible./blog/openssl-patches-three-security-vulnerabilities-in-1-1-0Tue, 30 Apr 2024 14:19:53 UTCOpenSSL Patches Two Security Vulnerabilities | ¶ºÒõ¹Ý.comOpenSSL patched two security vulnerabilities today. One rated "high" severity and one rated "low" serverity./blog/openssl-patches-two-vulnerabilitiesMon, 29 Apr 2024 11:33:48 UTCOrdering a .Onion Certificate from ¶ºÒõ¹Ý | ¶ºÒõ¹Ý.comHow to order and obtain an SSL/TLS certificate for a .onion domain. . onion is a special-use top-level domain name designating an anonymous onion service, which is reachable via the Tor network./blog/ordering-a-onion-certificate-from-digicertMon, 27 May 2024 16:51:37 UTCOur Latest Symantec Distrust Guidance | ¶ºÒõ¹Ý.comThis week, Apple announced they will be distrusting SSL/TLS certificates issued from Symantec¡¯s legacy root certificates, which includes the Thawte, GeoTrust, and RapidSSL brands./blog/our-latest-symantec-distrust-guidance-appleTue, 20 Sep 2022 20:35:07 UTCPartner Advisory: In-browser CSR generation support dropped in Firefox 69 | ¶ºÒõ¹Ý.comMozilla removed support for the non-standard (keygen) HTML element and HTMLKeygenElement DOM interface in Firefox 69. This aligns with the trend following other leading browsers. This change does not affect active code signing certificates. They can be used until they expire. When you generate the CSR for a code signing certificate, use Microsoft Internet Explorer or Apple Safari. If your customer's or your environment only permits usage of Firefox, consider using Firefox ESR or a portable copy of Firefox./blog/partner-advisory-in-browser-csr-generation-support-dropped-in-firefox-69Mon, 20 May 2024 19:00:37 UTCService Announcement: routine server maintenance on 22 September | ¶ºÒõ¹Ý.comOn 22 September 2019 from 06:30 to 08:30 UTC, we will perform routine server maintenance, affecting your access to our service and its functionality./blog/partner-advisory-routine-server-maintenance-on-22-septemberMon, 22 Apr 2024 17:17:40 UTCPartner Newsletter Issue 2 April 2018 | ¶ºÒõ¹Ý.comRead our Partner Newsletter, Issue 2, for April 2018./blog/partner-newsletter-issue-2-april-2018Fri, 10 May 2024 17:02:37 UTCPartner Newsletter - Issue 4 | ¶ºÒõ¹Ý.comThis fourth issue of our ¶ºÒõ¹Ý Partner News is the rollout of our Partner Marketing Portal. This is a new account/certificate management portal and API, opening for general availability and ensuing migration, with a target of later this year. As we welcome all of our partners to migrate to the new portal, we successfully achieved early dev releases of the CertCentral-based partner API on 11 July. We extended a few exclusive invitations to select partners to try this testable sneak-peek in order to gain early directional input. Their collective feedback will propel us towards our "open beta," targeted for late September. Of course, you don't have to wait until then: for a demo of the new partner API, simply contact your account manager./blog/partner-newsletter-issue-4Fri, 10 May 2024 14:06:37 UTCIntro to Penetration Testing Part 4: Considerations for Choosing a Pen Tester | ¶ºÒõ¹Ý.com5 considerations to keep in mind when choosing a pentesting provider for your company./blog/pentesting-part-4-considerations-choosing-pentesterFri, 5 Sep 2025 15:35:41 UTCPhishing: A Trending Threat for 2015 | ¶ºÒõ¹Ý.comCybersecurity threats are always evolving and emerging. Staying up-to-date on current threat can help organizations stay secure./blog/phishing-trending-threat-for-2015Mon, 20 May 2024 17:49:37 UTCPKI: Solving the IoT Authentication Problem | ¶ºÒõ¹Ý.comPKI provides a scalable and flexible solution to help secure IoT devices and systems today./blog/pki-solving-the-iot-authentication-problemFri, 10 May 2024 16:21:37 UTCPlanning for Japan IoT Security Regulation Changes in 2020 | ¶ºÒõ¹Ý.comA recent article published by Nikkei in Japan reported that the security risks posed by Internet of Things (IoT) devices is rising, and that the Ministry of Internal Affairs and Communications will be considering regulations beginning in 2020 to enforce standards. The regulations they are considering include mandating that all devices have identity, that devices prevent unauthorized access, and possibly in the field updates (or over the air (OTA)) remediation of issues. For manufacturers and device creators the risks have never been higher. The Mirai botnet attacks, in which millions of devices globally were breached and used in multiple Dedicated Denial of Service (DDoS) attacks, demonstrated clearly that devices require security measures to prevent unauthorized access, only run the correct code, and when necessary be able to securely communicate and receive updates for critical issues. In addition, this must be done at scale globally, so that we give device consumers the confidence their data won¡¯t be hacked or leaked, and devices commandeered for ill intent./blog/planning-for-japan-iot-security-regulation-changes-in-2020Tue, 30 Apr 2024 15:37:04 UTCGlobal Partner Series: How Plesk is Making SSL Easier for Hosting Providers & Web Admins | ¶ºÒõ¹Ý.comPlesk, a ¶ºÒõ¹Ý partner, makes SSL even easier with their extension--a one-click solution for enabling HTTPS. Watch the video./blog/plesk-extension-makes-ssl-easier-hosting-webTue, 5 Mar 2024 17:47:00 UTCPotential enhancements to EV standards | ¶ºÒõ¹Ý.comThe standards for EV certificates were developed in 2007, and although there have been several updates, there haven¡¯t been any major changes until recently. It¡¯s rare for a security standard to remain relatively unchanged for such a long time, especially as threats continue to evolve. Recently, ¶ºÒõ¹Ý came up with a set of improvements to enhance EV certificates. ¶ºÒõ¹Ý and several other Certificate Authorities reviewed that list of enhancements and settled on four standards which all agreed would have not only a positive impact on EV but also a fair chance of passing a CA/B Forum ballot. The four ideas agreed to discuss in the forum are: Require that the CA check the certificate type in the CAA record and respect a CAA policy regarding certificate type prior to issuing. This would mandate that the CA check the CAA record prior to issuance and, for example, if the requestor¡¯s CAA record said they only want EV, the CA could not issue any other type of certificate for that domain. Include Legal Entity Identifiers (LEIs) in certificates. LEIs are globally unique registration numbers created under a scheme supervised by the Global Legal Entity Identifier Foundation (GLEIF). Added to EV certificates, they provide a very strong form of identity for global organizations, which can be validated on the GLEIF website. Develop a white list of approved data sources to validate EV certificates. Currently, CAs are free to choose whatever authentication source meets the CA/B Forum guidelines. Not all data sources are created equal. Require CAs to verify a registered trademark/wordmark before issuing an EV certificate and include trademark and brand information in a certificate (as well as the source of validation). /blog/potential-enhancements-to-ev-standardsThu, 18 Apr 2024 17:52:18 UTCPredictions About IoT and Digital Transformation in 2020 | ¶ºÒõ¹Ý.comPredictions show it's an interesting time in the world of cyber security, with Google¡¯s claim of quantum supremacy, two cyber attacks aimed at the Labour party during elections in the UK, an increasing number of attacks against small and medium businesses, hospital care for patients disrupted by ransomware, many countries developing IoT security regulations, and governments and tech companies at odds over encryption of devices connected with criminal cases. Just to name a few. ¶ºÒõ¹Ý's predictions focused overall on digital transformation and are divided into three sub-categories ¨C Internet of Things (IoT), encryption and privacy. In addition to my thoughts below, a number of our experts, including Tim Hollebeek, industry and standards technical strategist and Mike Nelson, vice president of IoT Security also contributed to this year¡¯s prediction forecast. Both IoT and digital transformation remain top of mind for many (Google ¡°Internet of Things¡± and you¡¯ll be greeted with a mind-blowing 2.6+ billion results), generating plenty of excitement, and promising interesting thing in the years to come. /blog/predictions-about-iot-and-digital-transformation-in-2020Tue, 30 Apr 2024 16:44:55 UTCPrepare Now for General Data Protection Regulation or Be Ready to Pay Fines | ¶ºÒõ¹Ý.comThe GDPR compliance deadline is in May 2018. Companies should prepare now for compliance to avoid costly fines and damaging breaches./blog/prepare-now-for-gdpr-or-pay-finesFri, 12 Sep 2025 15:36:29 UTCProtecting the IoT with Security Solutions Now | ¶ºÒõ¹Ý.comThink beyond standard security practices for better data security the Internet of Things./blog/protecting-iot-solutions-nowThu, 18 Apr 2024 17:54:01 UTCProtecting personal information with IoT device security | ¶ºÒõ¹Ý.comPanasonic Connected Solutions Company builds IoT solutions that connect with people, devices and services. Chief Engineer Saburo Toyonaga and team develop security software for B-to-B IoT devices. They have developed an encryption module that permits incorporation of a certificate at manufacturing, and that runs efficiently even on CPUs with slower speeds or lower specifications. Panasonic is partnering with ¶ºÒõ¹Ý to secure IoT devices such as security cameras, to protect against information leakage and device integrity./blog/protecting-personal-information-with-iot-device-securityTue, 30 Apr 2024 16:59:39 UTCQualified Certificates for PSD2 Required by EU by September 2019 | ¶ºÒõ¹Ý.comPSD2 Compliance Required by EU in September 2019. European payment services providers are required to meet the September 2019 effective date for PSD2 technical standards, which includes the use of Qualified TLS and eSeal signing certificates for secure authentication and communication./blog/psd2-compliance-required-by-eu-september-2019Tue, 30 Apr 2024 14:51:03 UTCEasy Quick Start Guide to Build Strong WiFi Security | ¶ºÒõ¹Ý.comThe right way to build WiFi is to use already tried and true principles like a foundation of encryption with protocols designed specifically for WiFi./blog/quick-start-guide-build-strong-wi-fi-securityThu, 19 Jun 2025 21:51:37 UTCA Quick Start Guide to SSL Certificate Inventory and Management | ¶ºÒõ¹Ý.comManaging the ongoing security requirements server deployments can be an extremely challenging and demanding process./blog/quick-start-guide-to-ssl-certificate-inventory-managementMon, 20 May 2024 17:51:37 UTCRansomware: From Rising Threat to Business Crisis | ¶ºÒõ¹ÝToday, ransomware is something far more dangerous: a coordinated, industrialized threat to business continuity itself. Attackers no longer lock files./blog/ransomware-a-threat-on-the-riseThu, 10 Jul 2025 13:09:19 UTCRecent Awards for ¶ºÒõ¹Ý Customer Support & Product Development | ¶ºÒõ¹Ý.com¶ºÒõ¹Ý takes pride in the overall customer experience. We recently received awards that recognized our Customer Support and Product Development Teams./blog/recent-awards-digicert-customer-support-product-developmentTue, 30 Apr 2024 16:32:14 UTCNew Code Signing Working Group Chartered Due to Regulation Changes in CA/Browser Forum | ¶ºÒõ¹Ý.comWith changes to the governance regulations in the CA/Browser Forum, a new Code Signing Working Group was officially chartered in March 2019 and its main goal is to set standards related to the issuance and management of code signing certificates./blog/regulation-changes-ca-browser-forum-requires-new-code-signing-working-groupThu, 4 Apr 2024 16:16:29 UTCRemote Secure Document Signing | ¶ºÒõ¹Ý.comSign documents remotely with Digital Document Signing. ¶ºÒõ¹Ý's Digital Document Signing allows individuals, teams and organizations to add a digital signature to a document to prove the identity and authenticity of the sender, from wherever you are remotely and securely./blog/remote-secure-document-signingThu, 11 Sep 2025 15:05:08 UTCRemote Secure Mobile Device Management | ¶ºÒõ¹Ý.comRemote Mobile Device Management (MDM) solutions help companies manage and secure connected devices for remote workers. Public Key Infrastructure (PKI) is essential to managing your organizations¡¯ mobile devices./blog/remote-secure-mobile-device-managementMon, 27 May 2024 18:10:37 UTCHow to Remove an Expired Intermediate from the SSL Certificate Chain | ¶ºÒõ¹Ý.comLearn how to remove an expired cross-signed intermediate certificate./blog/remove-expired-intermediate-ssl-certificate-chainThu, 25 Apr 2024 18:09:14 UTCReplace Your Certificates for Internal Names: Part 2 | ¶ºÒõ¹Ý.comReconfigure your Microsoft Exchange Servers to use your registered domain names instead of internal names./blog/replace-internal-names-certificates-part-2Fri, 12 Sep 2025 15:15:12 UTCReplace Your Certificates for Internal Names | ¶ºÒõ¹Ý.comAll publicly trusted SSL Certificates issued to internal names and reserved IP addresses will expire before November 1, 2015./blog/replace-your-internal-name-certificatesMon, 20 May 2024 18:24:37 UTCResearchers Track "Tens of Thousands of Users" with Grindr App Geolocation Vulnerabilities | ¶ºÒõ¹Ý.comSecurity researchers Colby Moore and Patrick Wardle reveal how poor security practices in mobile application development could reveal your location to anyone./blog/researchers-track-tens-thousands-users-grindr-app-geolocation-vulnerabilitiesMon, 22 Apr 2024 17:02:49 UTCSafari 11 Introduces Improved UI for Certificate Warnings | ¶ºÒõ¹Ý.comApple announced Safari 11 and gave audiences a preview of the new features for the browser, including a redesigned error pages for SSL certificate warnings. The new certificate warning UI is an important improvement for Safari, and the first major change to its security UI in years./blog/safari-11-introduces-improved-ui-certificate-warningsTue, 30 Apr 2024 14:23:08 UTCWhy Safari Warns You That Some Sites are ¡°Not Secure¡± | ¶ºÒõ¹Ý.comWhy Safari is Showing "Not Secure" Warning in Browser. As of March 2019, Safari on macOS and iOS displays a warning reading ¡°Not Secure¡± in the address bar for all HTTP connections./blog/safari-browser-not-secure-warning-reFri, 24 May 2024 16:08:37 UTCSafari Warns about Unsecure Logins | ¶ºÒõ¹Ý.comThe latest version of Apple¡¯s browser, Safari 11.1, was released yesterday for iOS and macOS. The new update brings a warning for websites that offer login forms over unencrypted HTTP, which has become standard UI for most major web browsers./blog/safari-warns-about-unsecure-loginsFri, 12 Sep 2025 13:12:48 UTCSafe Online Shopping | ¶ºÒõ¹Ý.comSecure online shopping during COVID-19. Due to the Coronavirus global pandemic people are changing their shopping habits. What started with stores struggling to stock their shelves, is shifting to online orders and deliveries./blog/safe-online-shopping-during-covid-19Tue, 5 Mar 2024 17:01:21 UTCScaling CT Logs: Temporal Sharding | ¶ºÒõ¹Ý.comLater this month, CT will effectively become an industry-wide mandate when Google Chrome starts requiring it for all new publicly trusted SSL certificates./blog/scaling-certificate-transparency-logs-temporal-shardingThu, 11 Sep 2025 20:27:55 UTCSecure 5G: Next Gen Tech Meets Next Gen, Modern PKI | ¶ºÒõ¹Ý.comExperts predict that secure 5G will cover 40% of the world by 2024. In this article, we¡¯ll answer what 5G offers over 4G LTE and earlier technologies and what obstacles MNOs need to overcome to migrate to secure 5G, as well as how PKI can address common challenges with 5G migration./blog/secure-5g-next-gen-tech-meets-next-gen-modern-pkiTue, 5 Mar 2024 17:11:04 UTCIs Data in the Cloud Data at Risk? | ¶ºÒõ¹Ý.comOrganizations relying on cloud service providers should only trust and exchange data using high assurance SSL encryption and identity assurance./blog/secure-cloud-data-servicesMon, 20 May 2024 13:51:37 UTCSecurely Navigating the Web for your IRS Stimulus Package | ¶ºÒõ¹Ý.comSecurely Navigating the Web for your IRS Stimulus Package. The United States Coronavirus Aid, Relief, and Economic Security (CARES) Act was signed into law on March 27th, 2020./blog/securely-navigating-the-web-for-your-irs-stimulus-packageMon, 20 May 2024 12:57:37 UTCSecuring Enterprise Keys and Certificates Should Be a Priority | ¶ºÒõ¹Ý.comMaintaining the secrecy of private keys and certificates can save businesses millions of dollars in losses./blog/securing-enterprise-keys-and-certificates-should-be-a-priorityFri, 5 Sep 2025 15:32:27 UTCSecuring the Internet of Things: IoT World | ¶ºÒõ¹Ý.com¶ºÒõ¹Ý will be at the epicenter of IoT advancement this week at IoT World in Santa Clara, California./blog/securing-the-iot-and-iot-worldTue, 27 Feb 2024 14:07:04 UTCSecurity Advisory on Meltdown and Spectre | ¶ºÒõ¹Ý.comMeltdown and Spetre vulnerabilities don't directly affect the SSL/TLS protocol or SSL/TLS certificates; instead, they affect the CPU chips themselves. Customers should patch their systems./blog/security-advisory-meltdown-spectreMon, 20 May 2024 19:02:37 UTCCertificate Authority Authorization For Email Domains | ¶ºÒõ¹Ý¶ºÒõ¹Ý has enhanced security measures for issuing publicly trusted Secure Email (S/MIME) certificates by implementing Certificate Authority Authorization (CAA) checking./blog/certificate-authority-authorization-for-email-domainsFri, 5 Sep 2025 13:47:40 UTCSecurity Concerns in IoT Wearables | ¶ºÒõ¹Ý.comWhen it comes to IoT wearables, developers much think about security first./blog/security-concerns-in-iot-wearablesTue, 30 Apr 2024 15:46:08 UTCService Announcement: URL changes for partner portal & API | ¶ºÒõ¹Ý.comAs part of our re-brand and migration from the acquisition of Symantec Website Security we will change the URLs for our Partner Portal and API listed on this page./blog/service-announcement-url-changes-for-partner-portal-apiMon, 27 May 2024 16:19:37 UTCImportant SHA-2 SSL Certificate Questions & Answers | ¶ºÒõ¹Ý.comBecause SHA-1 SSL Certificates will likely not be trusted after 2016 on major platforms, ¶ºÒõ¹Ý is automatically upgrading all customers to SHA-2 SSL./blog/sha-2-questions-answeredTue, 30 Apr 2024 16:23:40 UTCShellshock Bash Bug: What You Need to Know | ¶ºÒõ¹Ý.comA critical vulnerability in Bash was discovered. Today, the bug has already been found 'in the wild' & in use by active exploits against web servers./blog/shellshock-need-know-critical-bash-bugThu, 25 Apr 2024 17:18:34 UTCHow Short-Lived Certificates Improve Certificate Trust | ¶ºÒõ¹Ý.comShort-lived certificates are a new innovation that can be used to extend TLS protections to a greater number of users/blog/short-lived-certificatesThu, 11 Sep 2025 20:50:42 UTCHow to Fix ¡°Site Is Using Outdated Security Settings¡± on Browser | ¶ºÒõ¹Ý.comLearn how to remove a cross-signed intermediate certificate from your browsers in Windows or Macs./blog/site-using-outdated-security-settings-browserMon, 26 Feb 2024 17:48:49 UTCHow to Fix ¡°Site Is Using Outdated Security Settings¡± on Server | ¶ºÒõ¹Ý.comLearn how to remove a cross-signed intermediate certificate from Windows, Apache, and Nginx servers./blog/site-using-outdated-security-settings-serverMon, 26 Feb 2024 18:16:22 UTCSLOTH Attacks and the Risks Involved | ¶ºÒõ¹Ý.comIt's time to move away from older cryptographic algorithms and onto stronger ones for better enterprise security./blog/sloth-attacks-and-their-risksThu, 25 Apr 2024 17:54:06 UTCSmart Home Security in 2016: You Could Be Vulnerable | ¶ºÒõ¹Ý.comSmart home devices are known for their security vulnerabilities. While users don¡¯t have complete control, they can choose devices and passwords wisely./blog/smart-home-security-2016Tue, 30 Apr 2024 14:43:21 UTCSSL Certificates Trusted by Every Major Browser | ¶ºÒõ¹Ý.comHigh Assurance SSL Certificates are trusted by all browsers so users always see https:// and the secure lock when they access a secure site./blog/ssl-certificates-trusted-every-major-browserFri, 24 May 2024 15:15:37 UTCSSL Improves Customer Experience | ¶ºÒõ¹Ý.comSSL is used every single day by millions of websites and applications to protect the sensitive information of their customers./blog/ssl-improves-customer-experienceThu, 11 Sep 2025 15:15:33 UTC5 Tools SSL Admins In The Security Industry Should Be Using | ¶ºÒõ¹Ý.comThe development of complimentary tools and utilities is a major focus of our development team. Here's a quick run-down of our most popular SSL tools./blog/ssl-tools-make-life-easierFri, 12 Sep 2025 16:21:43 UTCSSL vs. TLS: The Future of Data Encryption | ¶ºÒõ¹Ý.comSSL and TLS protocols are almost identical: Both encrypt data, but additional improvements in newer protocols mean better online security./blog/ssl-vs-tls-the-future-of-data-encryptionFri, 10 May 2024 16:22:37 UTCThis POODLE Bites: New Vulnerability Found on Servers | ¶ºÒõ¹Ý.comGoogle announced the "POODLE" vulnerability in SSL 3.0. This issue doesn't affect SSL Certs but action is required to protect secured online connections./blog/sslv3-vulnerability-poodleTue, 30 Apr 2024 14:48:40 UTCIntroducing the Standard User Role in CertCentral | ¶ºÒõ¹Ý.comThe new Standard User is allowed to place requests for certificates, such as new orders, renewals, or reissues as needed./blog/standard-user-role-certcentralMon, 20 May 2024 12:59:37 UTCStrengthening Trust & Identity in Blockchain Technology | ¶ºÒõ¹Ý.comToday, we are announcing our becoming a member of The Linux Foundation and a contributor to the open source project, Hyperledger./blog/strengthening-trust-and-identity-in-blockchain-technologyMon, 20 May 2024 18:12:37 UTCSTRIPTLS Attacks and Email Security | ¶ºÒõ¹Ý.comOnly 35% of SMTP server have configured encryption protocols correctly. Low adoption rates and improper configuration can lead to a STRIPTLS attack.?/blog/striptls-attacks-and-email-securityTue, 1 Oct 2024 19:49:25 UTCA Strong Incident Response Plan Reduces Breach Severity | ¶ºÒõ¹Ý.comBecause a security breach is unavoidable, a strong incident-response plan is necessary for a timely response during crisis and resilience after./blog/strong-incident-response-plan-reduces-breach-severityMon, 20 May 2024 17:53:37 UTCSuperfish-like Behavior Found Again with Komodia and PrivDog | ¶ºÒõ¹Ý.comResearchers have unveiled more adware and security applications that subvert HTTPS and our system of online trust, including PrivDog and Komodia./blog/superfish-like-behavior-found-komodia-privdogMon, 20 May 2024 18:21:37 UTCSweet32 Birthday Attack: What You Need to Know | ¶ºÒõ¹Ý.comOpenSSL announced a new attack affecting the Triple-DES cipher: Sweet32 Birthday Attack; it does not affect SSL Certificates../blog/sweet32-birthday-attack-what-you-need-to-knowWed, 3 Apr 2024 12:16:57 UTCSysAdmin Appreciation Day 2016 Giveaway | ¶ºÒõ¹Ý.comIt's time to celebrate sysadmins on SysAdmin Appreciation Day 2016--and we're doing a giveaway. View the post to see how you can win./blog/sysadmin-appreciation-day-2016Tue, 30 Apr 2024 17:43:17 UTCSysAdmin Day 2015 Giveaway | ¶ºÒõ¹Ý.com¶ºÒõ¹Ý is honoring all the system administrators out there with a giveaway for System Administrator Appreciation Day 2015. Enter to win!/blog/sysadmin-day-giveawayMon, 29 Apr 2024 11:36:46 UTCTake Action - System Maintenance on 6 April 2019 | ¶ºÒõ¹Ý.comMaintenance is scheduled for April 6, 2019 and will focus on moving key operations from our previous brands¡¯ data center(s) to our ¶ºÒõ¹Ý data center. The move requires us to bring the services of those data centers down during the move. We will capitalize on the downtime by simultaneously upgrading software at multiple points in our infrastructure. The combination of these activities will improve performance and compliance while diminishing operational risk. /blog/take-action-system-maintenance-on-6-april-2019Tue, 30 Apr 2024 14:18:24 UTCTaking a Data-Driven Approach Towards Compliance | ¶ºÒõ¹Ý.comAs the largest Certificate Authority globally, we need to stay on top of Compliance with millions of certs issued in any given year. Understanding problems with digital certificates requires inspection of data and analytics./blog/taking-a-data-driven-approach-towards-complianceFri, 5 Apr 2024 17:08:17 UTCThe Consequences of Domain Hijacking | ¶ºÒõ¹Ý.comDomain hijacking can be financially devastating for domain owners and tarnish brand reputation./blog/the-consquences-of-domain-hackingFri, 10 May 2024 16:12:37 UTCThe Crippling Cost of Expired SSL Certificates | ¶ºÒõ¹Ý.comCan you remember how many SSL Certificates you have or when each of them expires?Just keeping track of your certificates can be a full-time job./blog/the-crippling-cost-of-expired-ssl-certificatesFri, 10 May 2024 16:17:37 UTCThe Current State of .Onion Certificates and What Happens Next | ¶ºÒõ¹Ý.com¶ºÒõ¹Ý issued certificates to .onion addresses knowing they might need to be revoked. Learn what needs to come next to get .onion recognized./blog/the-current-state-of-onion-certificates-and-what-happens-nextFri, 10 May 2024 18:09:37 UTCThe Importance of Key Management in IoT Deployments | ¶ºÒõ¹Ý.comLearn more about the importance of key management in IoT deployments here./blog/the-importance-of-key-management-in-iot-deploymentsTue, 30 Apr 2024 15:16:39 UTCThe Security Benefits of Audit Logging | ¶ºÒõ¹Ý.comAudit logs help provide security because any sort of intrusion can be detected in real-time by examining audit records as they are created./blog/the-security-benefits-of-audit-loggingFri, 19 Apr 2024 15:51:36 UTCThe True Cost of Self-Signed SSL Certificates | ¶ºÒõ¹Ý.comThe benefits of using a trusted Certificate Authority for the security of your company far outweigh the potential loss of securing it yourself./blog/the-true-cost-of-self-signed-ssl-certificatesThu, 11 Sep 2025 20:48:05 UTCThis Month in SSL: November 2015 | ¶ºÒõ¹Ý.comHere is our latest news roundup of articles about network and SSL security for November 2015./blog/this-month-in-ssl-november-2015Fri, 5 Sep 2025 15:15:56 UTCUnderstanding the Threat Landscape When Using the Cloud | ¶ºÒõ¹Ý.comIt is impossible for the modern enterprise to avoid using the cloud, so organizations need to be aware of the growing threat landscape to avoid attack./blog/threat-landscape-in-the-cloudMon, 20 May 2024 18:37:37 UTCThree Challenges for the Industrial IoT | ¶ºÒõ¹Ý.comAs with IoT, the IIoT poses a myriad of threats ranging from eavesdropping to malicious attacks on privacy and personal data./blog/three-challenges-for-industrial-iotFri, 5 Sep 2025 15:36:56 UTC3 Lessons Administrators Can Learn From the eBay Hack | ¶ºÒõ¹Ý.comWe need a fundamental shift in our mindset on data security. Leveraging technology and better policies, we can improve online data security./blog/three-lessons-to-learn-from-the-ebay-hackMon, 20 May 2024 13:49:37 UTCThwarting the Man-in-the-Middle | ¶ºÒõ¹Ý.comLearn what man-in-the-middle attacks are and how you can prevent yourself and your users from becoming victims./blog/thwarting-man-middleFri, 24 May 2024 15:02:37 UTCWhat¡¯s in a Name? Reviewing Website Identification | ¶ºÒõ¹Ý.comReviewing website identification and the importance of TLS certificates to secure websites has increased dramatically. SSL certificates by ¶ºÒõ¹Ý secure unlimited servers with the strongest encryption and highest authentication available./blog/tls-ssl-certificates-and-website-identity-nTue, 30 Apr 2024 15:52:28 UTCTrends & Threats Briefing, April 2019 | ¶ºÒõ¹Ý.com¶ºÒõ¹Ý now provides your source for April 2019's news about TLS, SSL, PKI, IoT, encryption, identity, and digital certificates. Headlines provide jump links to each summary and external news source. For on-demand recorded webcasts and webinars, visit ¶ºÒõ¹Ý¡¯s channel on the BrightTalk network./blog/trends-threats-briefing-april-2019Sat, 16 Jul 2022 12:41:58 UTCTrends & Threats Briefing, February 2019 | ¶ºÒõ¹Ý.com¶ºÒõ¹Ý now provides your source for February 2019's news about TLS, SSL, PKI, IoT, encryption, identity, and digital certificates. Headlines provide jump links to each summary and external news source. For on-demand recorded webcasts and webinars, visit ¶ºÒõ¹Ý¡¯s channel on the BrightTalk network./blog/trends-threats-briefing-february-2019Sat, 16 Jul 2022 12:46:21 UTCTrends & Threats Briefing, January 2019 | ¶ºÒõ¹Ý.com¶ºÒõ¹Ý now provides your source for January 2019's news about TLS, SSL, PKI, IoT, encryption, identity, and digital certificates. Headlines provide jump links to each summary and external news source. For on-demand recorded webcasts and webinars, visit ¶ºÒõ¹Ý¡¯s channel on the BrightTalk network./blog/trends-threats-briefing-january-2019Sat, 16 Jul 2022 12:45:04 UTCTrends & Threats Briefing, March 2019 | ¶ºÒõ¹Ý.com¶ºÒõ¹Ý now provides your source for March 2019's news about TLS, SSL, PKI, IoT, encryption, identity, and digital certificates. Headlines provide jump links to each summary and external news source. For on-demand recorded webcasts and webinars, visit ¶ºÒõ¹Ý¡¯s channel on the BrightTalk network./blog/trends-threats-briefing-march-2019Sat, 16 Jul 2022 12:42:52 UTCTrends & Threats Briefing, May 2019 | ¶ºÒõ¹Ý.com¶ºÒõ¹Ý now provides your source for May 2019's news about TLS, SSL, PKI, IoT, encryption, identity, and digital certificates. Headlines provide jump links to each summary and external news source. For on-demand recorded webcasts and webinars, visit ¶ºÒõ¹Ý¡¯s channel on the BrightTalk network./blog/trends-threats-briefing-may-2019Sat, 16 Jul 2022 05:57:31 UTCUnderstanding the Google Chrome Connection Tab | ¶ºÒõ¹Ý.comRead this post to understand what¡¯s causing the yellow triangle and red 'X' icons in Chrome¡¯s Connection Tab, and get useful tips for how to get rid of them./blog/understanding-the-google-chrome-connection-tabTue, 30 Apr 2024 16:39:44 UTCUpcoming EOL & Service Improvements | ¶ºÒõ¹Ý.comChanges are coming to the Malware Scanning and Vulnerability Assessment functionality across our Symantec and GeoTrust products. Changes will also be made to the Symantec Seal-in-Search functionality./blog/upcoming-eol-service-improvementsMon, 22 Apr 2024 17:29:21 UTCUpdate: Take Action - System Maintenance on 6 April 2019 | ¶ºÒõ¹Ý.comMaintenance is scheduled for April 6, 2019 and will focus on moving key operations from our previous brands¡¯ data center(s) to our ¶ºÒõ¹Ý data center. The move requires us to bring the services of those data centers down during the move. We will capitalize on the downtime by simultaneously upgrading software at multiple points in our infrastructure. The combination of these activities will improve performance and compliance while diminishing operational risk. /blog/update-take-action-system-maintenance-on-6-april-2019Fri, 10 May 2024 18:17:37 UTCUpgrading to CertCentral Partner?: So Far, and What¡¯s Next? | ¶ºÒõ¹Ý.comAs part of the ¶ºÒõ¹Ý purchase of Symantec website security and PKI solutions in November 2017, we promised to bring those Symantec systems up to modern compliance standards, deprecate unnecessary systems and improve the customer experience./blog/upgrading-to-certcentral-partner-so-far-and-whats-nextThu, 4 Apr 2024 15:40:15 UTCUploading Documents Is Safer than Email | ¶ºÒõ¹Ý.comIf the choice is between sending a document by email or through a secure account, always choose to submit it through a secure account. It¡¯s safe & easy./blog/uploading-docs-is-safer-than-emailTue, 1 Oct 2024 19:50:53 UTCHow to Use PKI To Secure the IoT | ¶ºÒõ¹ÝRapid growth in IoT (Internet of Things) is leading companies to struggle with security. The solution for this challenge; PKI is the strongest and best solution for securing the IoT. /blog/using-pki-to-secure-the-iotFri, 10 May 2024 18:10:37 UTCVPN + PKI = a Solution to Secure Remote Worker Access | ¶ºÒõ¹Ý.comWorking from home has increased not only Virtual Private Network (VPN) usage but also vulnerability. Now more employees need to access the corporate private network but as your organization¡¯s VPN usage increases, you need to consider increased threats, preventing attacks, and VPN monitoring policies./blog/vpn-and-pki-solution-to-secure-remote-worker-accessFri, 5 Sep 2025 15:30:20 UTCHow Website Seals Affect User Trust | ¶ºÒõ¹Ý.comWhen users visit a site, add an item to the shopping cart, and proceed to checkout, their trust is put to the test. Website seals help insure that trust./blog/website-seals-affect-user-trustMon, 22 Apr 2024 16:53:42 UTCThis Week in SSL ¨C Gmail¡¯s Malware Accounts, FBI Phishing, Perma-Cookies, and Brazil¡¯s New Internet | ¶ºÒõ¹Ý.comA communication technique long used by everyone from adulterers to terrorists has now been co-opted by hackers. This article by Andy Greenberg reports on the technique./blog/week-ssl-gmails-malware-accounts-fbi-phishing-perma-cookies-brazils-new-internetThu, 4 Sep 2025 15:21:37 UTCThis Week in SSL - Mozilla Revokes 1024-bit Roots Certs, Two-Factor Under Attack, Chinese MITM Attacks | ¶ºÒõ¹Ý.comLet¡¯s take a look at some of the more intriguing news articles this week about SSL Certificates and network security./blog/week-ssl-mozilla-revokes-1024-bit-roots-certs-two-factor-attack-chinese-mitm-attacksMon, 20 May 2024 18:04:37 UTCThis Week in SSL ¨C Shell Shock, Smartphone Encryption, and Google¡¯s SSL Push | ¶ºÒõ¹Ý.comLet¡¯s take a look at some of the more interesting articles that appeared this week on the subject of SSL Certificates and Internet security./blog/week-ssl-shell-shock-smartphone-encryption-googles-ssl-pushMon, 20 May 2024 11:51:37 UTCThis Week in SSL ¨C Zero Day Windows Exploit, Chinese Hack iCloud, and Details on the JPMorgan Hack | ¶ºÒõ¹Ý.comThis Week in SSL ¨C Zero Day Windows Exploit, Chinese Hack iCloud, and Details on the JPMorgan Hack/blog/week-ssl-zero-day-windows-exploit-chinese-hack-icloud-details-jpmorgan-hackFri, 24 May 2024 16:28:37 UTCWelcome to the Web, HTTP/2 | ¶ºÒõ¹Ý.comHTTP/2 is a new protocol expected to improve Internet connectivity speeds and the standard of Internet security./blog/welcome-web-http2Fri, 24 May 2024 15:07:37 UTCWhat are over-the-air-updates? | ¶ºÒõ¹Ý.comManufacturers need a way to send updates to each connected device while maintaining security. Learn the basics of over-the-air updates in this post./blog/what-are-over-the-air-updatesMon, 20 May 2024 11:58:12 UTCWhat the Internet of Things Means for Your Car | ¶ºÒõ¹Ý.comThe movement to add connectivity to our cars comes laden with numerous security concerns./blog/what-internet-of-things-means-for-carsTue, 30 Apr 2024 15:25:39 UTCWhat Is SHA-2 and How the SHA-1 Deprecation Affects You | ¶ºÒõ¹Ý.comTwo easy-to-use free tools to make SHA-1 migration as easy as possible and provide a free SHA-2 certificate for sites upgrading to SHA-256./blog/what-is-sha-2-and-how-it-affects-youThu, 25 Apr 2024 18:06:11 UTCWhich Voting Method Is Most Secure? ?| ¶ºÒõ¹ÝVoting machines are a popular choice in the U.S., especially when paired with a paper audit system. But they¡¯re not immune to flaws. /blog/what-is-the-most-secure-voting-methodThu, 13 Jun 2024 07:42:12 UTCWhat the Acquisition of Cybertrust Roots Means for ¶ºÒõ¹Ý Customers | ¶ºÒõ¹Ý.comThe purpose of this post is to explain more about the benefits of the Cybertrust roots and to explain what they mean for ¶ºÒõ¹Ý customers./blog/what-the-acquisition-of-cybertrust-roots-meansFri, 10 May 2024 14:04:37 UTCWhat to Expect from the RSA Security Conference | ¶ºÒõ¹Ý.comIn less than a week, the RSA Conference is celebrating its 25th anniversary this year, continuing to drive the security industry forward worldwide/blog/what-to-expect-from-rsa-2016Fri, 12 Sep 2025 13:55:04 UTCWhich SSL Certificate Do I Need? | ¶ºÒõ¹Ý.comChoosing the kind of TLS/SSL certificate you need to buy is an important decision. In any online business, it is critical to create a trusted environment where potential customers feel confident./blog/which-ssl-certificateMon, 21 Jul 2025 16:30:58 UTCWhy CIOs and CSOs Should Work Together | ¶ºÒõ¹Ý.comCIOs and CSOs play different, but equal roles in an organization. Ultimately, these professionals should work together to ensure complete security./blog/why-cios-csos-should-work-togetherMon, 20 May 2024 18:13:37 UTCWhy Home Network Security Is Important | ¶ºÒõ¹Ý.comUsers, in addition to manufacturers, need to think about private home networks and all of the IoT devices linked to them./blog/why-home-network-security-is-importantTue, 30 Apr 2024 16:56:58 UTCHow Mixed Content Compromises Security | ¶ºÒõ¹Ý.comMixed content can compromise the security of your website. Learn about the two kinds of mixed and why your HTML should only pull from SSL resources./blog/why-mixed-content-compromises-securityFri, 7 May 2021 08:53:07 UTC·Ö¸î½yÖÎ | ¶ºÒõ¹Ý.comWe¡¯re doing the little things because that¡¯s half of how we do things at ¶ºÒõ¹Ý: I mean, of course you expect us to release big things (like all those upcoming CertCentral-based partner features, and like the recent ¶ºÒõ¹Ý Secure Site product release) ¨C and while that was the focus of our releases (and marketing, and sales) under our previous owners, it¡¯s now only the first half of how we do things. At ¶ºÒõ¹Ý, we strive to constantly evolve and tune our product ¨C so that it becomes more efficient, more effective, and more valuable to you over time./blog/why-the-little-thingsMon, 20 May 2024 18:58:37 UTCWi-Fi is hacked and so are your IoT devices? | ¶ºÒõ¹Ý.comThere are varying types of IoT devices including (but not limited to) devices used for industrial, healthcare, scientific, entertainment, home control and automation, and personal fitness purposes. The threat level of these devices varies widely, as does the implementation security levels each one uses./blog/wi-fi-hacked-iot-devicesFri, 28 Mar 2025 19:26:17 UTCNCSAM Tip of the Week: Securing Public WiFi with SecureWiFi Certificates | ¶ºÒõ¹Ý.comPasspoint release 2, along with new WiFi certificates, help secure data transferred during online sign-up and increase user trust in public WiFi networks./blog/wifi-certificates-passpointTue, 30 Apr 2024 15:29:13 UTCWiFi Network Attacks 101 | ¶ºÒõ¹Ý.comLearn the top types of WiFi network attacks and how to protect yourself against them./blog/wifi-network-attacks-101Mon, 20 May 2024 18:50:37 UTCPatch Tuesday: WinShock Vulnerability | ¶ºÒõ¹Ý.comPatches for a critical vulnerability in Schannel were released. This vulnerability could allow remote code execution on a large number of Windows platforms./blog/winshock-vulnerabilityFri, 5 Apr 2024 17:07:39 UTCWorking with Delegated OCSP Responders and EKU Chaining | ¶ºÒõ¹Ý.comIt was reported recently that due to a technical flaw, it is possible for some CAs to create valid OCSP responses for certificates that they did not issue and do not control./blog/working-with-delegated-ocsp-responders-and-eku-chainingFri, 24 May 2024 15:32:37 UTCWorld Hosting Days and the Future of Cloud Security | ¶ºÒõ¹Ý.comWith cloud use among enterprises and SMBs on the rise, security concerns are at the forefront of many experts' minds./blog/world-hosting-days-future-of-cloud-securityWed, 28 Feb 2024 14:23:20 UTCCA/B Forum Update October 2020 | ¶ºÒõ¹ÝThe CA/Browser Forum met virtually from Oct. 20¨C22 for their fall meeting. There is a growing trend in the CA/B Forum to limit the fields authorized in certificates, and Google has made several announcements, including announcing a Chrome Root Store./blog/ca-b-forum-update-october-20201Thu, 21 Oct 2021 22:36:24 UTC25 Security Blogs and PKI Experts You Need to Follow Today | ¶ºÒõ¹ÝAs it stands, the global cybersecurity market is worth $173B and predicted to grow to $270B by 2026. To get the inside track, we've compiled a list of the top 25 blogs and experts, in the security and PKI space that will get your questions answered./blog/25-security-blogs-and-pki-experts-you-need-to-follow-todayThu, 10 Jun 2021 13:49:30 UTC3 Surprising Uses of PKI | ¶ºÒõ¹ÝLearn more about three surprising uses of PKI in big companies like using digital signatures, encrypted and authenticated email communications, and physical and virtual smart card authentication, and how to ensure they are all secure by reading more here. /blog/3-surprising-uses-of-pki-in-big-companies-and-how-to-ensure-they-are-all-secureWed, 12 Jun 2024 19:03:52 UTCBuilding Trust In An Untrusting WorldThe COVID-19 pandemic has disrupted our lives in many different ways, be that our personal, our social, or our business lives. We now rely on the Internet and online platforms to enable us continue to keep in touch with loved ones, with our work colleagues, and to buy more services and products online./blog/building-trust-in-an-untrusting-worldFri, 5 Sep 2025 15:23:46 UTCOne Year Public Trust SSL Certificates: ¶ºÒõ¹Ý's Here to HelpOne-Year Public-Trust TLS SSL Certificates. Apple announced at the February 2020 CA/Browser Forum meeting that they will no longer accept publicly trusted TLS webserver certificates valid for longer than 398 days after Sept 1, 2020./blog/one-year-public-trust-ssl-certificates-digicerts-here-to-helpTue, 4 Jun 2024 15:45:29 UTCPosition on 1-Year CertificatesWhile the industry has shortened validity times, we still offer service plans of up to 2, 3, even 6 years¡ªand the automation to make it seamless./blog/position-on-1-year-certificates1Thu, 7 Oct 2021 01:38:46 UTC¶ºÒõ¹Ý shuts down legacy Symantec TLS systems with migration of more than 250,000 customers and partners to CertCentralThis new year marks an important milestone for us at ¶ºÒõ¹Ý, as we complete the migration of our customers and partners from legacy Symantec enterprise, retail and partner TLS consoles to our award-winning ¶ºÒõ¹Ý CertCentral? TLS Manager/blog/digicert-succesfully-shuts-down-legacy-symantec-tls-systems-migrates-customers-partners-to-certcentralMon, 2 May 2022 17:47:13 UTC¶ºÒõ¹Ý ONE Receives IoT Breakthrough Security Product of the Year Award¶ºÒõ¹Ý ONE, the company¡¯s modern, wholistic approach to PKI management, has been recognized as 2021¡¯s IoT Breakthrough Security Product of the Year./blog/digicert-one-receives-iot-breakthrough-security-product-of-the-year-awardThu, 21 Oct 2021 22:20:39 UTCSolarWinds Attack: Is Code Signing to Blame? | ¶ºÒõ¹ÝAll chatter about the SolarWinds attack is regarding the magnitude of this attack. What happened to SolarWinds could happen to many other large organizations that sell products requiring regular updates./blog/is-code-signing-to-blame-for-solarwinds-attackWed, 15 Feb 2023 04:56:09 UTC¶ºÒõ¹Ý¡¯s Introduction to the CA/B Forum | ¶ºÒõ¹Ý.comLearn more about how ¶ºÒõ¹Ý is on the frontline for our customers and certificate users. We relay informed suggestions and developments to the Forum after listening to your requirements. Read more here. /blog/digicerts-introduction-to-the-cab-forumMon, 20 May 2024 12:09:37 UTCCode Signing Certificate vs TLS/SSL Certificates: Everything You Need to Know | ¶ºÒõ¹ÝEverything You Need to Know about Code Signing Certificates vs TLS/SSL Certificates. TLS/SSL certificates establish encrypted connections between browsers, servers or websites while Code signing certificates ensure that code cannot be tampered with. However, they are not the same thing and cannot be used interchangeably./blog/everything-you-need-to-know-about-code-signing-vs-tls-ssl-certificatesThu, 11 Sep 2025 19:50:58 UTCOnline Identity Vetting Accelerating through New Technologies and Regulatory StandardsThe pandemic created a shift to online transactions and remote working that has changed every industry worldwide. What is online identity vetting? It's the process of verifying that identity attributes of an applicant are accurately gathered, validated, and evidenced./blog/online-id-vetting-accelerating-through-new-tech-and-regulatory-standardsWed, 20 Mar 2024 13:08:37 UTCWhy It¡¯s Never Been a Better Time to Automate | ¶ºÒõ¹Ý.comThe business case for implementing automation now is becoming more and more apparent. Companies that apply automation now will be the ones to get ahead tomorrow. Here are six compelling reasons to start using automation tools now to manage your digital certificates. /blog/why-its-never-been-a-better-time-to-automateMon, 3 Jun 2024 13:53:47 UTC¶ºÒõ¹Ý Named to CRN Security 100 List for Web, Application and Email Security¶ºÒõ¹Ý is honored to be named one of the 20 coolest Web, Application and Email Security Companies of 2021 by CRN for the second year in a row./blog/digicert-makes-crn-top-20-list-of-web-application-and-email-security-companiesTue, 27 Feb 2024 15:57:00 UTC New 5G Specification Report for EU Provides Guidance for Securing 5G | ¶ºÒõ¹ÝThe European Union Agency for Cybersecurity (ENISA) just released their Security in 5G Specifications ¡ª Controls in 3GPP report to help regulatory authorities better understand 3GPP and what operators must do to secure 5G networks. /blog/new-5g-spec-eu-report-provides-guidance-for-securing-5gSat, 12 Oct 2024 05:43:25 UTC¶ºÒõ¹Ý¡¯s March 2021 CA/Browser Forum RecapThe CA/Browser Forum met March 2¨C4 for its spring virtual meeting. For an overview of what the Forum does and how it works, see ¶ºÒõ¹Ý¡¯s Introduction to the CA/B Forum. For the most part, it was a relatively quiet meeting, as the spring meeting often is after the holidays./blog/ca-browser-forum-recap-march-2021Mon, 22 Apr 2024 17:27:43 UTCThe Impact of Quantum Computing on Society | Post Quantum Cryptography | ¶ºÒõ¹Ý Quantum computing has the potential to be ¡°as revolutionary in the 2020s as smartphones were in the 2010s,¡± according to current strategists. The benefits of quantum computing will extend to all aspects of society. Quantum computing will quite literally change the world in various sectors including privacy, finance, healthcare, entertainment and technology./blog/the-impact-of-quantum-computing-on-societyTue, 25 Feb 2025 15:54:27 UTCHow-And Why-To Automate Certificate Management? | Automation Security Solutions | ¶ºÒõ¹ÝSecurity Automation solutions - to automate or not to automate. Here is a list of what you should and should not automate./blog/to-automate-or-not-to-automateThu, 9 May 2024 12:38:37 UTCCybersecurity in the New Normal: How COVID-19 Has Changed Security for GoodIt¡¯s been over a year since COVID-19 shut down offices and forced businesses to reimagine new ways of working. However, some of the changes from the pandemic will likely be permanent. /blog/how-covid-19-has-changed-cybersecurity-for-goodThu, 19 Jun 2025 21:43:05 UTCHow to Identify Fake Websites | ¶ºÒõ¹ÝIn the age of digital transformation, knowing how to identify fake websites is not just helpful; it¡¯s absolutely necessary to protect yourself online. Knowing how to spot a fraudulent website can protect your personal and work identity, your financial information and logins for your email and social media./blog/how-to-identify-fake-websitesFri, 6 Dec 2024 17:54:18 UTCHow to Gain Complete Control Over Your TLS/SSL Certificate Inventory Through Discovery and AutomationTLS/SSL certificates need to constantly be monitored, stay safe from vulnerabilities and avoid expirations. Most organizations don't have a complete, real-time picture of their certificate landscape. Without visibility it's impossible to gain control over unrenewed certificates./blog/gain-complete-control-over-ssl-certificate-inventory-through-discovery-and-automationThu, 4 Sep 2025 18:18:35 UTCGuest Opinion: IoT Devices Need Greater Conformity and Security Built InWith so many diverse languages in the world, poor written and verbal communication can often be confused, with conversations devolving into utter nonsense. Before 2000, when the cloud was born and all else was just ideas or demos, we were used to having a ¡°tribe¡± of easily recognizable devices, including desktop computers, terminals, laptops and the start of cell phones./blog/guest-opinion-iot-devices-need-greater-conformity-and-securityThu, 4 Sep 2025 22:00:09 UTCHow ¶ºÒõ¹Ý Ensures the Integrity of Certificates: FAQs about ¶ºÒõ¹Ý Compliance & InfrastructureFAQs about ¶ºÒõ¹Ý Compliance & Infrastructure. We take this responsibility seriously and are committed to making the internet a safer space through ensuring the integrity of our certificates and continually improving our processes. To accomplish this, we institute several extensive security practices to maintain trust of these systems. /blog/how-digicert-ensures-the-integrity-of-certificates-faqsThu, 19 Jun 2025 21:36:54 UTCThis IoT Day, Don¡¯t Forget to Discuss Device Security | ¶ºÒõ¹ÝIoT Day serves as an international opportunity to foster discussions about the implications of the internet of things in everyday life. As IoT Day approaches on April 9th, we are sharing a few tips on IoT security from our decades of experience in the industry./blog/discuss-device-security-this-iot-dayThu, 11 Sep 2025 19:43:35 UTCAutomated Security is a Key Component to Digital Transformation | ¶ºÒõ¹ÝDigital transformation is changing the way organizations operate. Especially as workforces transitioned to working from home in 2020, digital transformation, or the process of transitioning to digital technologies, has become even more urgent./blog/automated-security-key-component-to-digital-transformationFri, 20 Jun 2025 16:50:32 UTCWhy You Shouldn¡¯t Post Your Vaccine Card to Social MediaWhy You Shouldn¡¯t Post Your Vaccine Card to Social Media. Posting a picture of your COVID vaccine card on social media could lure attackers and phishers and more./blog/why-you-shouldnt-post-your-vaccine-card-to-social-mediaThu, 4 Sep 2025 18:18:35 UTCCode Signing Baseline Requirements to Require Larger Keys | ¶ºÒõ¹ÝCode Signing security standard to require larger keys. Unlike TLS certificates, code signing certificates need to be able to create signatures that will remain secure well into the future. Shorter keys are less resistant to future cryptographic attacks, which means weaker trust in signed code./blog/code-signing-baseline-requirements-to-require-larger-keysFri, 24 May 2024 15:13:37 UTCNote onn Whois GDPR and domain validation | ¶ºÒõ¹ÝYou may have read in the news about how registry and registrar compliance with GDPR¡ªthe European Union¡¯s new regulation on data protection that goes into effect on May 25¡ªcould impact WHOIS availability and the speed in which certificate authorities (CAs) handle domain control validation. Learn more about WHOIS GDPR here./blog/note-on-whois-gdpr-and-domain-validationThu, 4 Sep 2025 21:45:14 UTCBenefits of public key pinning /blog/benefits-of-public-key-pinningWed, 7 Sep 2022 17:11:02 UTCWhy Use PKI to Secure IoT Devices to The Cloud | Internet of Things | ¶ºÒõ¹ÝWhy Use PKI security solutions to Secure IoT (internet of things) Devices to The Cloud? While the benefits of connecting IoT devices to the cloud are promising, managing and securing a growing web of connected devices is no easy feat./blog/why-use-pki-to-secure-iot-devices-to-the-cloudThu, 25 Apr 2024 18:15:39 UTCHow Vaccine Passports Could Change Digital Identity | ¶ºÒõ¹ÝAs more and more people are preparing to travel, some locations are requiring proof of vaccination, negative COVID test results or some sort of vaccine passport. Read more on how vaccine passports could change digital identity forever./blog/how-vaccine-passports-could-change-digital-identityMon, 20 May 2024 18:39:37 UTCWhy Private Keys Should Not be SharedPrivate Key management is a critical component to keeping your software signing secure. The practice of private key sharing amongst software development and DevOps teams increases your threat vector exponentially and it needs to stop./blog/why-private-keys-should-not-be-sharedFri, 12 Sep 2025 13:42:40 UTCWhat Makes Digital Document Signatures Secure | Document Signing Security | ¶ºÒõ¹ÝWhat Makes Digital Signatures Secure? Over the past year, organizations have accelerated their digital transformation processes due to the push for remote work, but without proper security, digital transformation is vulnerable to attacks and potential service failures. /blog/what-makes-digital-signatures-secureTue, 4 Jun 2024 13:45:54 UTCCreating a dedicated Extended Key Usage (EKU) for Document SigningAn Internet-Draft has been proposed to the IETF to create an Extended Key Usage (EKU) dedicated to document signing. Read more on what this means for digital signatures./blog/creating-a-dedicated-eku-for-document-signingTue, 30 Apr 2024 16:20:06 UTC¶ºÒõ¹Ý¡¯s June 2021 CA/Browser Forum RecapThe CA/Browser (CA/B) Forum¡¯s virtual Face to Face was held from June 15¨C17. This was the fifth virtual Face to Face since the meetings moved online due to COVID-19 /blog/ca-browser-forum-recap-june-2021Tue, 30 Apr 2024 16:08:15 UTCHow to Connect IoT Devices to Cloud Platforms Like Microsoft Azure IoT Using CertificatesHow to Connect IoT Devices to Microsoft Azure IoT. Whether for manufacturers, smart cities, connected vehicles or any other large scale IoT device use case, Azure IoT Hub offers a cloud solution to connect virtually any device./blog/how-to-connect-iot-devices-to-cloud-platforms-like-microsoft-azure-iotTue, 30 Apr 2024 15:44:35 UTCTypes of Electronic Signatures & When to Use Them | Digital Document Signing SolutionsIn this brave new world of electronic signatures, not every type is created equally, and some are better for certain use cases. We¡¯ll review what you need to know about this new type of digital signature today./blog/types-of-electronic-signatures-and-when-to-use-themFri, 17 Feb 2023 14:42:22 UTCChoosing the right number of VMCs for your business needs | ¶ºÒõ¹ÝAs part of our discussion on how to get a Verified Mark Certificate (VMC), which enables companies to present their logo in the ¡°sender¡± field in email clients, today we¡¯re diving into how many VMCs your organization will need./blog/how-many-vmcs-will-i-needTue, 26 Aug 2025 18:31:52 UTCGetting Your Logo in Your User's Inbox: VMC Tips Learned from the Gmail PilotAs we wrap up the Gmail BIMI pilot and make Verified Mark Certificates (VMCs) for sale, we¡¯d like to thank the pilot participants that made it possible. Here's are a few tips we learned while conducting the pilot. /blog/getting-your-logo-in-users-inbox-tips-from-vmc-gmail-pilotFri, 13 Dec 2024 20:29:04 UTCThe Key to Secure Electric Vehicle Charging | EV Security - ¶ºÒõ¹ÝWhile the popularity of Electric Vehicles is on the rise, so are the cyber threats. As EV sales are growing there's a need to secure and protect these electric vehicles charging stations. /blog/the-key-to-secure-electric-vehicle-chargingWed, 15 Feb 2023 16:14:54 UTCThe New Gamechanger for Email Marketing On average, an individual receives 121 emails per day, and since the pandemic more emphasis has been placed on online communications. With the newly introduced Verified Mark Certificates (VMCs), marketers can now use their trademarked logo as a visual branding element within the email inbox ¡ª prior to a click through. /blog/the-new-gamechanger-for-email-marketing-verified-mark-certificatesFri, 5 Sep 2025 13:47:30 UTCNew U.S. Senate Bill Proposes Digital Signatures to Protect Sensitive Court Orders | ¶ºÒõ¹ÝImportant new legislative developments in the United States move forward the use of digital signatures to assert the origin and integrity of important legal electronic documents such as court orders./blog/new-senate-bill-proposes-digital-signatures-for-sensitive-court-documentsFri, 5 Sep 2025 13:47:11 UTCClear Requirements are Essential for Trust on the Internet | ¶ºÒõ¹ÝDepending on the browser and operating system that you use, anywhere from 50 to over 100 different organizations across the world are trusted to ensure that your browsing experience on the internet is a secure one. /blog/clear-requirements-essential-for-trust-on-the-internetFri, 20 Jun 2025 16:45:03 UTCImproving the Nation¡¯s Cybersecurity through Software Code Signing | ¶ºÒõ¹ÝU.S. President Joe Biden¡¯s executive order dated May 12, 2021, on improving the nation¡¯s cybersecurity, outlined multiple steps that both the government and businesses could take to help mitigate attacks on the country¡¯s critical infrastructure./blog/improving-the-nations-cybersecurity-through-software-code-signingThu, 4 Sep 2025 18:18:35 UTC¶ºÒõ¹Ý Company Culture What¡¯s it like to work for or with ¶ºÒõ¹Ý? Well, we do what¡¯s right for digital security, innovate to solve problems and take care of our customers and our people. Read on to learn more about our Company values and what its like to work at ¶ºÒõ¹Ý./blog/digicert-cultureFri, 5 Sep 2025 13:47:29 UTCFrom the 90s to Today ¨C How Phishing, and the Strategies to Combat it, Have Evolved Over TimeIt¡¯s safe to say that since 1995 phishing threats have evolved, becoming more diversified and impactful. However, as phishing strategies have evolved, so have the best practices to combat it. /blog/how-phishing-and-combat-strategies-have-evolvedFri, 13 Dec 2024 20:26:13 UTCLatest News in TLS/SSL: September 2021This Month in TLS/SSL: September 2021. Here is our latest news roundup of articles about TLS/SSL, Encryption, Cybersecurity, Cybercrime, Malware and Ransomware attacks, IoT (Internet of Things) and PKI (Public Key Infrastructure) network security./blog/latest-news-in-tls-ssl-september-2021Fri, 5 Sep 2025 13:47:23 UTCHow to Make Electronic Signatures Legally Binding in the EU and GloballyHow to make electronic signatures legally binding in the eu and globally. There are essentially two approaches to legal validity in e-signatures. Read more to find out how./blog/how-to-make-electronic-signatures-legally-bindingThu, 4 Sep 2025 18:18:35 UTCDo Your Part, Be Cyber Smart: National Cybersecurity Awareness MonthAs we transition into October, it¡¯s time again for Cybersecurity Awareness Month. The 2021 theme of #BeCyberSmart is just as relevant as ever, and weekly prompts evaluate how you and your organization are doing in areas of cybersecurity./blog/cybersecurity-awareness-month-do-your-part-be-cyber-smartThu, 4 Sep 2025 18:18:35 UTCEnterprises Overwhelmed in the Absence of PKI Automation, ¶ºÒõ¹Ý FindsIn August, ¶ºÒõ¹Ý released its 2021 State of PKI Automation Survey. The report includes responses of IT directors, IT security managers, and IT generalists operating out of 400 enterprises with at least 1,000 employees globally. /blog/enterprises-overwhelmed-in-the-absence-of-pki-automationFri, 5 Sep 2025 13:47:41 UTCHow to Securely Sign Digital Documents | e-Signature Document Signing | ¶ºÒõ¹ÝAs digital transformation and remote work have increased the need for digital communications and transactions, individuals, teams and organizations have increasingly relied on electronic digital document signing or e-signature with Adobe, Microsoft and other programs./blog/how-to-securely-sign-digital-documentsFri, 5 Sep 2025 13:47:26 UTCUnderstanding the Differences Between Leaders and Laggards in PKI Automation | ¶ºÒõ¹ÝIn the last survey we found the number of certificates had increased for organizations in recent years. We also uncovered that organizations suffered certificate outages because of limited visibility. This explains organizations¡¯ ongoing move towards PKI automation./blog/understanding-differences-between-leaders-and-laggards-in-pki-automationThu, 4 Sep 2025 18:18:36 UTCHow to Secure Your Business through The Supply ChainPresent day attacks demonstrate the complexity of today¡¯s modern business world and how inter-reliant we are on third parties, and how a disruption in one part of the software supply chain can have effects for the business. /blog/how-to-secure-your-business-through-the-supply-chainThu, 4 Sep 2025 18:18:36 UTC¶ºÒõ¹Ý¡¯s October 2021 CA/Browser Forum RecapThe CA/Browser Forum met in October for the final time this year. This month¡¯s meeting was productive, with news updates including news about Apple¡¯s new root program, certificate profiles, eIDAS 2.0, the return of in-person meetings and more./blog/ca-browser-forum-recap-october-2021Fri, 5 Sep 2025 13:47:42 UTCThis Month in TLS/SSL: October 2021 This Month in TLS/SSL: October 2021. Here is our latest news roundup of articles about TLS/SSL, Encryption, Cybersecurity, Cybercrime, Malware and Ransomware attacks, IoT (Internet of Things) and PKI (Public Key Infrastructure) network security./blog/this-month-in-tls-ssl-october-2021Fri, 5 Sep 2025 13:47:11 UTC¶ºÒõ¹Ý 2022 Security Predictions | ¶ºÒõ¹ÝTo take stock of where we¡¯re at and what lies on the horizon, we¡¯ve once again gathered our team of cybersecurity experts. Let¡¯s take a closer look at what they observed in the crystal ball for 2022./blog/digicert-2022-security-predictionsFri, 5 Sep 2025 13:47:44 UTCStrategic Planning is Key to Root Certificate Management | ¶ºÒõ¹ÝThe recent expiration of a Let¡¯s Encrypt root certificate led to outages and other challenges for connected services and devices. Read on for more./blog/strategic-planning-is-key-to-root-certificate-managementWed, 21 Feb 2024 17:53:04 UTCCybersecurity for Seniors ¨C 7 Steps to Update Your Parents¡¯ Security This ThanksgivingSeniors are frequently targeted for phishing scams and cyberattacks. Although cybersecurity for seniors can seem overwhelming, most attacks can be prevented. Here are 7 Steps to Update Your Parents¡¯ Security This Thanksgiving./blog/cybersecurity-for-seniors-in-7-stepsMon, 17 Oct 2022 14:40:33 UTCThis Month in TLS/SSL: November 2021This Month in TLS/SSL: November 2021. Here is our latest news roundup of articles about TLS/SSL, Encryption, Cybersecurity, Cybercrime, Malware and Ransomware attacks, IoT (Internet of Things) and PKI (Public Key Infrastructure) network security./blog/this-month-in-tls-ssl-november-2021Wed, 21 Feb 2024 18:31:36 UTC¶ºÒõ¹Ý¡¯s Compliance Culture: A Proactive ApproachSecurity is at the heart of everything that ¶ºÒõ¹Ý does. Maintaining that security and trust requires a constant focus on standards and compliance, with the changing landscape of threats and risks facing ¶ºÒõ¹Ý and our customers./blog/digicerts-compliance-culture-a-proactive-approachWed, 12 Oct 2022 17:02:48 UTCLatest News In TLS/SSL: 2021 Year in Review | ¶ºÒõ¹ÝIn 2021, we brought you monthly roundups of the latest news about network and TLS/SSL security. Looking back on the year, we¡¯ve now rounded up the biggest network and TLS security headlines of 2021. Furthermore, a team of ¶ºÒõ¹Ý experts have made some forecasts for 2022 trends which you can read in this post./blog/latest-news-in-tls-ssl-2021-year-in-reviewThu, 4 Sep 2025 18:18:36 UTCPKI as the Foundation for Zero Trust | Public Key Infrastructure (PKI) | ¶ºÒõ¹Ý PKI in A Zero-Trust network requires verification of every access request by default. In a network of ¡°never trust,¡± strong digital identities that can be verified are key to building a Zero-Trust infrastructure. /blog/pki-as-the-foundation-for-zero-trustThu, 4 Sep 2025 18:18:36 UTCLatest News In TLS/SSL: January 2022This Month in TLS/SSL: January 2022. Here is our latest news roundup of articles about TLS/SSL, Encryption, Cybersecurity, Cybercrime, Malware and Ransomware attacks, IoT (Internet of Things) and PKI (Public Key Infrastructure) network security./blog/this-month-in-tls-ssl-january-2022Thu, 4 Sep 2025 18:18:36 UTCHow to Secure Your Crypto Wallet Against Hacks: 10 Tips to Protect Your CryptocurrencyHow to secure your crypto wallet against hackers. Here are 10 Tips to protect and safeguard your cryptocurrency./blog/how-to-secure-your-crypto-wallet-against-hacksWed, 2 Nov 2022 18:26:37 UTCBest Practices to Prepare to Automate PKI Certificates and Workflows | ¶ºÒõ¹ÝIn a recent survey ¶ºÒõ¹Ý found that about two-thirds of enterprises are concerned about how much time they spend managing digital certificates. Read more about PKI certificate automation best practices. /blog/pki-certificate-automation-best-practicesWed, 21 Feb 2024 17:44:31 UTCZero Trust is a Lifetime Metric | ¶ºÒõ¹ÝWhat is zero trust? Trust is established at the door when you log in to your computer or to a web portal. Trust is never absolute./blog/zero-trust-is-a-lifetime-metricWed, 21 Feb 2024 19:17:55 UTC¶ºÒõ¹Ý¡¯s February 2022 CA/Browser Forum Recap | ¶ºÒõ¹ÝFor the first time since the pandemic began, the CA/Browser Forum held in-person meetings in February 2022. Read more to catch the latest news./blog/ca-browser-forum-recap-february-2022Tue, 25 Feb 2025 15:27:13 UTCZero Trust is a Paradigm Shift | ¶ºÒõ¹ÝZero trust is a paradigm shift, and not a disruptive technology. However, there are still many lingering questions about zero trust./blog/zero-trust-is-a-paradigm-shiftThu, 4 Sep 2025 18:18:36 UTCProtecting the Digital Planet Against Evolving Threats | ¶ºÒõ¹ÝWhen it comes to cybersecurity for the Internet of Things (IoT), we need to examine not just where the problem lies today, but also, more importantly, where it may manifest again tomorrow./blog/protecting-the-digital-planet-against-evolving-threatsWed, 21 Feb 2024 18:04:07 UTCEU Energy Label (EPREL) Seeks Efficiency Using Qualified E-Seal Certificates | ¶ºÒõ¹ÝEU suppliers, manufacturers, and importers must register their product models which require an energy label before selling them in the EU/EEA market. EPREL has chosen to use Qualified e-Seal Certificates governed by eIDAS to accomplish this. /blog/eprel-seeks-efficiency-using-qualified-e-seal-certificatesSat, 12 Oct 2024 05:46:49 UTCWhat is a Certificate Authority? CA's Explained | ¶ºÒõ¹ÝA certificate authority (CA) is a trusted organization that issues digital certificates for websites. Certificate authorities validate a website domain and, depending on the type of certificate issue TLS/SSL certificates that are trusted by web browsers like Chrome, Safari and Firefox./blog/what-is-a-certificate-authorityTue, 11 Mar 2025 00:48:03 UTCThe Big Zero: How to Protect the Cybersecurity Chain of Trust | ¶ºÒõ¹ÝHow to Protect the Cybersecurity Chain of Trust . The cybersecurity industry is buzzing with the four pillars of zero initiatives: zero-trust architecture, zero passwords, zero perimeter (perimeter-less) and zero-touch provisioning. Read this weeks post to learn more./blog/how-to-protect-the-cybersecurity-chain-of-trustWed, 21 Feb 2024 19:00:41 UTCLatest News In TLS/SSL: March 2022 | ¶ºÒõ¹ÝThis Month in TLS/SSL: March 2022. Here is our latest news roundup of articles about TLS/SSL, Encryption, Cybersecurity, Cybercrime, Malware and Ransomware attacks, IoT (Internet of Things) and PKI (Public Key Infrastructure) network security./blog/this-month-in-tls-ssl-march-2022Thu, 22 Feb 2024 07:07:02 UTCWith ¶ºÒõ¹Ý, You¡¯re Buying More Than Just a Certificate: ¶ºÒõ¹Ý¡¯s 5-Star Global SupportBuy more than just a digital certificate with ¶ºÒõ¹Ý. We pride ourselves in world-class support with a local touch. One of our core values is to take care of our customers and our people./blog/more-than-just-a-certificate-with-digicerts-5-star-global-supportThu, 4 Sep 2025 21:41:43 UTC¶ºÒõ¹Ý CertCentral Enhancements Allow for More In-Depth Discovery, Bulk Domain Validation & More We are releasing several enhancements to ¶ºÒõ¹Ý CertCentral? in Q2 2022 to further strengthen our TLS/SSL certificate lifecycle management offerings and that will make certificate management easier./blog/certcentral-enhancements-more-in-depth-discovery-bulk-domain-validationFri, 4 Nov 2022 13:12:42 UTCDigital Trust as an IT Imperative | ¶ºÒõ¹ÝIn today's world, the pace of digital transformation has accelerated and people are constantly online. It is because of this that digital trust must now be embedded in IT architectures that are themselves more complex but secure./blog/digital-trust-as-an-it-imperativeThu, 4 Sep 2025 20:37:36 UTCHow Technology is Transforming Industries in the Digital Era | ¶ºÒõ¹ÝSrinivas Kumar answers difficult questions from challenges and differences between IT and OT and why they're different as well as customer pain points and what solutions are available. /blog/how-technology-is-transforming-industries-in-the-digital-eraThu, 4 Sep 2025 21:06:07 UTCThe Road Ahead for a Trusted IoT | ¶ºÒõ¹ÝTrue value creation comes from embedding identity and trust in operational intelligence that drives analytics and decision engines with transitive trust. Read more about the Road Ahead for a digitally trusted IoT./blog/the-road-ahead-for-a-trusted-iotThu, 4 Sep 2025 21:02:49 UTCAs DNS Hijacking Increases, ¶ºÒõ¹Ý Labs Funds Research for Automatically Detecting DNS Attacks at Scale In recent years, DNS hijacking cases have increased. As the leader in digital trust, we're working with researchers at UC San Diego and Stanford to prevent future attacks by understanding DNS hijacks, identifying maliciously obtained certs and building countermeasures. /blog/digicert-funds-research-for-auto-detecting-dns-attacks-at-scaleWed, 21 Feb 2024 18:37:53 UTC¶ºÒõ¹Ý Security Summit 2022: Top Takeaways ¶ºÒõ¹Ý Security Summit is an annual gathering of the industry¡¯s leading innovators and professionals to discuss the latest threats and best practices in digital security. Check out our Top Takeaways for 2022./blog/top-takeaways-from-digicert-security-summit-2022Thu, 4 Sep 2025 20:33:32 UTCRansomware Attacks Becoming the New Normal; How to Protect the IoT The spikes of ransomware attacks in the USA signals a new normal. With the level of risk countermeasures and awareness training required the prospect of quickly getting the situation under control appears bleak for a variety of reasons./blog/ransomware-attacks-becoming-the-new-normalWed, 21 Feb 2024 18:29:07 UTCThe Elixir of Things: Strategies for Device Protection by Sector | ¶ºÒõ¹ÝThe effectiveness of IOT security requires baked-in controls and and lies in multi-vendor collaboration as a forethought and so the induction of modern controls must be strategic, measured and rational./blog/strategies-for-iot-device-protection-by-sectorThu, 4 Sep 2025 21:17:06 UTCProtecting IoT Devices in Operational Technologies | ¶ºÒõ¹ÝProtecting devices in the age of cyberwarfare will literally require drawing the line in the sand between the traditional information technology (IT) and operational technology (OT) wheelhouses./blog/protecting-iot-devices-in-operational-technologiesThu, 22 Feb 2024 07:05:46 UTCSetting the New Standard for Digital Trust in Smart Home with Matter Protocol | ¶ºÒõ¹ÝAt ¶ºÒõ¹Ý, we¡¯ve supported the Matter standard throughout the process and believe it will promote greater interoperability, security and digital trust for consumers. /blog/setting-new-standard-for-digital-trust-in-smart-home-with-matter-protocolWed, 15 Feb 2023 16:14:41 UTCThe Connected Cloud of Things (CoT) | ¶ºÒõ¹ÝAt ¶ºÒõ¹Ý, we¡¯re all about protecting the connected cloud of things (CoT) to enable digital trust. Whether it¡¯s one device or billions, ¶ºÒõ¹Ý? IoT Device Manager provides a comprehensive, automated workflow for companies to manage their IoT devices with certificate-based security./blog/the-connected-cloud-of-thingsFri, 10 Jun 2022 13:37:17 UTCDigital Trust for the Perimeter-less Enterprise | ¶ºÒõ¹ÝTechnology trends have shifted how IT professionals think about security at the corporate perimeter. Read more in our blog on Digital Trust for the perimeter-less enterprise. /blog/digital-trust-for-the-perimeter-less-enterpriseThu, 4 Sep 2025 21:29:08 UTCLatest News In Digital Trust: May 2022 | ¶ºÒõ¹ÝThis Month in Digital Trust: May 2022. Here is our latest news roundup of articles about TLS/SSL, Encryption, Cybersecurity, Cybercrime, Malware and Ransomware attacks, IoT (Internet of Things) and PKI (Public Key Infrastructure) network security./blog/this-month-in-tls-ssl-may-2022Fri, 5 Sep 2025 13:47:33 UTCVMC Adoption is Growing with Apple Support | ¶ºÒõ¹ÝVerified Mark Certificates (VMCs) are enjoying continued growth and exposure in the marketplace. Starting last year by Gmail, VMCs will now be shown by Apple in iOS 16 and MacOS Ventura. /blog/vmc-adoption-growing-with-apple-supportFri, 13 Dec 2024 20:23:51 UTC¶ºÒõ¹Ý¡¯s June 2022 CA/Browser Forum Recap | ¶ºÒõ¹ÝThe June CA/Browser (CA/B) Forum meeting was held this month in Warsaw, Poland hosted by Certificate Authority Asseco. Updates in this meeting included Apple¡¯s root store for Verified Mark Certificates (VMCs) and a final draft of S/MIME Baseline Requirements. /blog/ca-browser-forum-recap-june-2022Tue, 25 Feb 2025 15:28:35 UTCImproved Requirements for Code Signing Key Protection | ¶ºÒõ¹ÝRecognizing the risk that software-based key protection poses, the Code Signing Working Group of the CA/Browser Forum recently passed a ballot to strengthen the requirements surrounding private keys used for code signing./blog/improved-requirements-for-code-signing-key-protectionTue, 30 Apr 2024 14:31:04 UTCNIST Announces Selection of First Quantum-Resistant Cryptographic Algorithms | ¶ºÒõ¹ÝQuantum computers could break the internet. Well, not exactly. That¡¯s why NIST has been reviewing potential cryptographic algorithms that could withstand both traditional and quantum computers. Read more about how this announcement signals that it¡¯s time to start preparing for when NIST¡¯s standards go into place./blog/nist-announces-selection-of-first-quantum-resistant-cryptographic-algorithmsFri, 5 Sep 2025 13:47:27 UTCSecure GPG Signing That Works: ¶ºÒõ¹Ý Now Supports the GPG Keyring in ¶ºÒõ¹Ý Software Trust ManagerRead about how ¶ºÒõ¹Ý now supports the GPG Keyring in ¶ºÒõ¹Ý Software Trust Manager./blog/digicert-now-supports-gpg-keyring-in-secure-software-managerWed, 15 Feb 2023 05:11:04 UTCMiles Per Cyberattack | ¶ºÒõ¹ÝRead about how the cybersecurity challenge for information technology (IT) stakeholders is enforcement of digital security across all managed assets (computers and network elements) to prevent malware infections and consequences thereof. /blog/miles-per-cyberattackThu, 22 Feb 2024 07:07:54 UTCHow to Improve Crypto-Agility Through Visibility & Automation | ¶ºÒõ¹ÝDigital transformation has accelerated, increasing the surface area of how businesses, people, and things are connected. Learn more about how to Improve crypto-agility through visibility & automation here./blog/how-to-improve-crypto-agility-through-visibility-automationWed, 21 Feb 2024 17:59:08 UTCTaking Certificate Lifecycle Management to the Next Level | DigicertTLS/SSL certificate lifecycle management can be difficult and time-consuming if done manually. In a recent survey, ¶ºÒõ¹Ý found that about two-thirds of enterprises are concerned about how much time they spend managing certificates, and about half said that they frequently discover rogue certificates. Read more about why there¡¯s never been a more critical time to gain control over your certificate inventory, here./blog/taking-certificate-lifecycle-management-to-the-next-levelWed, 21 Feb 2024 19:02:56 UTCProtecting the Software Supply Chain: Cautionary Tales and Trends | ¶ºÒõ¹ÝHow to Protect the Software Supply Chain. In this blog, we explain pitfalls with traditional, manual or local code signing and how a secure software signing solution enforces best practices. /blog/protecting-the-software-supply-chainWed, 21 Feb 2024 17:55:40 UTCGoogle to Shut Down IoT Core Service on August 16, 2023 | ¶ºÒõ¹ÝGoogle has surprised several customers and industry specialists by announcing that it will shut down its IoT Core service next year. Read more/blog/google-to-shut-down-iot-core-serviceFri, 19 Aug 2022 15:47:45 UTCHow to Become Matter Compliant & Why You Shouldn¡¯t DIY Device Attestation | ¶ºÒõ¹ÝDevice attestation is critical to Matter-trusted devices and device manufacturers need to start preparing their devices to be Matter trusted. Read more on how to become matter compliant. /blog/how-to-become-matter-compliantFri, 10 Feb 2023 20:17:52 UTCMatter - The Standard of the Future | ¶ºÒõ¹ÝMatter is more than just an initiative. Matter goes so much further than just IoT for smart homes, cities, transportation, industrial and IoT health devices; it could be applied to all connected devices./blog/matter-the-standard-of-the-futureWed, 16 Nov 2022 15:59:49 UTCMeasuring Success with Digital Trust | ¶ºÒõ¹ÝWhat constitutes digital trust success and how do you measure it? Digital trust is what enables us to build, participate in and grow the connected world that we now live in. Read more here to find out./blog/measuring-success-with-digital-trustThu, 4 Sep 2025 21:14:42 UTCWebhooks Now Available in ¶ºÒõ¹Ý CertCentral | ¶ºÒõ¹ÝWebhooks are now available to ¶ºÒõ¹Ý CertCentral enterprise and partner customers, making it easier than ever to allow applications to speak to one another. Read more here. /blog/webhooks-now-available-in-digicert-certcentralWed, 5 Oct 2022 14:40:49 UTCEU Announces First Ever Move to Legislate Cybersecurity for IoT | ¶ºÒõ¹ÝThe EU Cyber Resilience Act is the first EU-wide legislation to impose cybersecurity rules on manufacturers and will cover both hardware and software and applies to both manufacturers and developers./blog/eu-moves-to-legislate-cybersecurity-for-iotWed, 15 Feb 2023 16:14:05 UTCHow Zero Trust Can Enable Digital Trust | ¶ºÒõ¹ÝDigital trust and zero trust are both common cybersecurity phrases, but what do they mean and what is the difference between them? /blog/digital-trust-vs-zero-trustThu, 4 Sep 2025 20:41:02 UTCWhat¡¯s the MATTER? Digital Trust & Smart Home Device Connectivity | ¶ºÒõ¹Ý¶ºÒõ¹Ý offers a unique combination of technology and staff expertise to help device manufacturers gain efficiencies and achieve rapid time to market for Matter compliance. /blog/whats-the-matter-digital-trust-smart-home-device-connectivityThu, 19 Jun 2025 21:39:46 UTCLatest News in Digital Trust: September 2022 | ¶ºÒõ¹ÝThis Month in Digital Trust: Sept. 2022. Here is our latest news roundup of articles about TLS/SSL, Encryption, Cybersecurity, Cybercrime, Malware and Ransomware attacks, IoT (Internet of Things) and PKI (Public Key Infrastructure) network security./blog/this-month-in-tls-ssl-september-2022Fri, 13 Dec 2024 20:25:19 UTCSolving Digital Trust for the Real World | ¶ºÒõ¹Ý BlogToday, we are excited to introduce Amit Sinha as our new CEO. Amit brings a strong background scaling category-defining companies to drive real change within cybersecurity./blog/solving-digital-trust-for-the-real-worldThu, 4 Sep 2025 21:26:53 UTCWhy You Shouldn¡¯t Overuse Single Wildcard TLS/SSL Certificates | ¶ºÒõ¹ÝWildcard TLS/SSL certificates are an excellent example of an efficient solution that can quickly become insecure if not managed just right. the more wildcards are reused, the more of a security threat they can become. /blog/why-you-shouldn-t-overuse-single-wildcard-tls-ssl-certificateFri, 11 Oct 2024 14:48:58 UTCVerified Mark Certificate (VMCs) Adoption Grows, Increasing Digital Trust in Email Inboxes | ¶ºÒõ¹ÝCompanies all over are using Verified Mark Certificates (VMCs) now more than ever to showcase their brand in every email. Read more on how this is impacting global digital trust in email. /blog/vmc-adoption-growth-increasing-digital-trustFri, 13 Dec 2024 20:22:35 UTCOpenSSL Releases Patch for High Level Vulnerability in Versions 3.0 and Above | ¶ºÒõ¹ÝToday OpenSSL released a ¡°security-fix¡± (version 3.0.7) to address a high level critical vulnerability in versions 3.0 and above. Read more to find out everything you need to know. /blog/openssl-releases-patch-for-high-level-vulnerability-in-3-0-and-aboveTue, 1 Nov 2022 18:57:59 UTCLatest News In Digital Trust: October 2022 | ¶ºÒõ¹ÝThis Month in Digital Trust: Oct 2022. Here is our latest news roundup of articles about TLS/SSL, Encryption, Cybersecurity, Cybercrime, Malware and Ransomware attacks, IoT (Internet of Things) and PKI (Public Key Infrastructure) network security. /blog/latest-news-in-digital-trust-october-2022Wed, 7 Dec 2022 18:50:48 UTC¶ºÒõ¹Ý 2023 Security Predictions | ¶ºÒõ¹ÝTo take stock of where we¡¯re at and what lies on the horizon, we¡¯ve once again gathered our team of cybersecurity experts. So what does 2023 hold? Read more to find out./blog/digicert-2023-security-predictionsFri, 11 Nov 2022 09:00:35 UTCBuilding Confidence in Secure Elections with Digital Trust?| DigicertTrust in national election results is the backbone of a democratic society. At the heart of that trust is citizen confidence in the integrity of the election processes. /blog/secure-elections-with-digital-trustWed, 7 Dec 2022 18:48:40 UTC¶ºÒõ¹Ý¡¯s October 2022 CA/B Forum Recap?| DigicertThe latest CA/B Forum meeting was held in late October in Berlin, and it was one of the first widely attended face to face meetings since before the pandemic./blog/ca-browser-forum-recap-october-2022Mon, 14 Nov 2022 15:12:27 UTCSecure Online Shopping during the Holidays | ¶ºÒõ¹ÝThere are a few simple ways to make sure your online purchases are secure and safe while shopping for that perfect gift.?Read more for our top tips for secure online shopping this holiday season. /blog/secure-online-shopping-holiday-editionFri, 5 Sep 2025 13:47:41 UTCKeys are the Achilles Heel of Cryptography?| ¶ºÒõ¹ÝCryptography provides a frictionless surface for digital trust in data, devices and users. Where does one begin the digital transformation journey. Read more to find out./blog/keys-are-the-achilles-heel-of-cryptographyTue, 22 Nov 2022 15:53:24 UTCSmart Home Just Got Smarter with Matter-Trusted Devices | ¶ºÒõ¹ÝSmart homes are supposed to make your life easier, but with every smart home device requiring their own apps to manage them, it hasn¡¯t been easy for consumers to manage their different devices. Read more about Matter-Trusted Devices here. /blog/smarter-home-with-matter-trusted-devicesFri, 5 Sep 2025 13:47:34 UTCThe Matter with Smart Devices | Matter IoT Devices | ¶ºÒõ¹ÝThe growth in IoT smart devices, particularly in the smart home, is explosive and it seems now that every household IoT device has some inbuilt smart capabilities. /blog/the-matter-with-smart-devicesThu, 4 Sep 2025 22:06:59 UTCComputer Security Day ¨C Committing to Cyber Safety?| ¶ºÒõ¹ÝEvery November 30th is Computer Security Day¡ªa holiday inaugurated by the Association for Computer Machinery (ACM) in 1988./blog/computer-security-dayWed, 30 Nov 2022 13:59:43 UTCU.S. Efforts Underway for IoT Security Labels by Spring 2023??| ¶ºÒõ¹ÝU.S. Efforts Underway for IoT Security Labels by Spring 2023. As digital transformation has accelerated in recent years, so has our adoption of the Internet of Things (IoT). Experts estimate that there will be about 30 billion IoT devices by 2030. /blog/iot-security-labels-by-spring-2023Wed, 15 Feb 2023 16:14:33 UTCDigital Trust is More than a Certificate: Manage it More Easily with ¶ºÒõ¹Ý? Platinum Support | ¶ºÒõ¹ÝOur customers choose us for our expertise, innovative products and high-quality and technical customer support. One of the best ways to access our expertise is through ¶ºÒõ¹Ý? Platinum Support./blog/digital-trust-manage-it-with-digicert-platinum-supportFri, 5 Sep 2025 13:47:25 UTCLatest News in Digital Trust - 2022 Year in Review | ¶ºÒõ¹ÝThis Year in Digital Trust: 2022 Roundup. Here is our news roundup of all articles for 2022 about TLS/SSL, Encryption, Cybersecurity, Cybercrime, Malware and Ransomware attacks, IoT (Internet of Things) and PKI (Public Key Infrastructure) network security./blog/latest-news-in-digital-trust-2022-year-in-reviewMon, 30 Jun 2025 19:00:29 UTCSecuring Email: Digital Trust in Communications | ¶ºÒõ¹ÝPhishing attacks now commonplace, corporate information security programs routinely train on how to avoid email compromise. However, the frequency of email attacks has dramatically accelerated over the last couple of years./blog/securing-digital-trust-in-email-communicationsThu, 4 Sep 2025 21:23:33 UTCThe History of Cryptography | ¶ºÒõ¹ÝCryptography allows us to interact in the digital world securely by protecting and sending ¡°messages¡± to the intended recipient through use of algorithms and keys. Digital signing, data privacy, online transactions and more rely on this encryption./blog/the-history-of-cryptographyMon, 2 Jan 2023 16:19:38 UTCCA/Browser Forum Adopts First Baseline Requirements for S/MIME Certificates | ¶ºÒõ¹ÝCA/Browser (CA/B) Forum approves ballot for first Baseline Requirements for publicly trusted S/MIME digital certificates for email security set to take effect in 2023. /blog/ca-browser-forum-adopts-s-mime-baseline-requirementsFri, 16 Aug 2024 15:52:09 UTCS/MIME considers adoption of CAA | ¶ºÒõ¹ÝFollowing the recent adoption of the S/MIME Baseline Requirements?, the CA/Browser Forum is considering the expansion of CAA to include S/MIME certificates./blog/smime-considers-adoption-of-caaFri, 5 Sep 2025 13:47:12 UTCIntroducing ¶ºÒõ¹Ý? Trust ?Lifecycle Manager | ¶ºÒõ¹ÝOrganizations are experiencing increasing pressure to manage digital trust at scale. Unifying CA-Agnostic Certificate Lifecycle Management and PKI Services in a Full-Stack Solution./blog/introducing-digicert-trust-lifecycle-managerFri, 5 Sep 2025 13:47:45 UTCNew RFC 9336 for Document Signing | ¶ºÒõ¹ÝThe Internet Engineering Task Force (IETF) has released the new RFC 9336 standard, which defines a general-purpose Extended Key Usage (EKU) dedicated to electronic signatures and document signing. /blog/new-rfc-9336-for-document-signingWed, 15 Feb 2023 15:31:46 UTCBuilding Digital Trust in a Perimeterless World | ¶ºÒõ¹ÝDigital trust is the confidence that users, partners, and customers place in your organization¡¯s ability to secure data, systems, and interactions consistently and at scale./blog/building-digital-trust-in-todays-perimeterless-ageThu, 4 Sep 2025 21:25:17 UTCWhat Went Wrong with GitHub Stolen Code Signing Keys and How to Prevent It from Happening to You | ¶ºÒõ¹ÝOn January 31, 2023, the popular code hosting platform GitHub reported that an unauthorized user gained access to its systems on December 6, 2022, and stole three encrypted code-signing certificates. Once detected, GitHub immediately revoked the unauthorized credentials./blog/github-stolen-code-signing-keys-and-how-to-prevent-itFri, 5 Sep 2025 13:47:27 UTCLatest News in Digital Trust ¨C January 2023 | ¶ºÒõ¹Ý¶ºÒõ¹Ý News, We are proud to present ¶ºÒõ¹Ý? Trust Lifecycle Manager, a comprehensive digital trust solution that unifies CA-agnostic certificate management and public key infrastructure (PKI) services./blog/latest-news-in-digital-trust-january-2023Wed, 15 Feb 2023 15:19:49 UTCLessons From The Equifax Data Breach | ¶ºÒõ¹ÝIt all started when Equifax failed to discover an expired digital certificate used by a network tracking device./blog/lessons-from-the-equifax-data-breachFri, 5 Sep 2025 13:47:22 UTCHow Will Quantum Computing Impact Email Security? | ¶ºÒõ¹ÝQuantum computers will change the way many industries operate, and the impacts of quantum computing will affect all aspects of society. Quantum computers could be used to solve complex problems faster and more accurately than traditional computers./blog/how-quantum-computing-impacts-email-securityTue, 1 Oct 2024 19:50:10 UTC¶ºÒõ¹Ý? ONE Managers Renamed to Reflect Digital Trust Benefits | ¶ºÒõ¹ÝAs we continue to innovate on the ¶ºÒõ¹Ý? ONE platform for digital trust, we are updating the names of its managers to reflect the many market-defining features and benefits that we provide to our customers and partners.?Digital trust is what enables us to have confidence that the things we are doing online./blog/digicert-one-renamed-to-reflect-digital-trustThu, 23 Feb 2023 16:34:19 UTCVerified Mark Certificates (VMCs) Available for Six New Trademark Offices & Government Marks | ¶ºÒõ¹ÝVerified Mark Certificates (VMCs) are a key way to both stand out in the inbox and provide a visual indicator of the brand. VMCs are a part of the Brand Indicators for Message Identification (BIMI) initiative and launched in July 2021. Since then, companies globally have utilized VMCs to demonstrate their brand in emails. /blog/verified-mark-certificates-available-for-trademark-offices-and-governmentsFri, 13 Dec 2024 20:21:25 UTCIAM Teams: Three steps to achieving invisible authentication at scale | ¶ºÒõ¹ÝIn today¡¯s environment, characterized by a perimeterless organization, identity and access management (IAM) teams are dealing with accelerating complexity.?One common use case IAM teams must address is Wi-Fi and VPN network authentication without compromising security. /blog/three-steps-to-achieving-invisible-authentication-at-scaleTue, 7 Mar 2023 15:04:53 UTCChrome¡¯s Proposed 90-Day Certificate Validity Period: What You Need to Know | ¶ºÒõ¹ÝChrome released their vision for their root policy that involved included 90-day certificate validity periods. This does not mean that 90-day certificates will become a reality right away, but it does start the conversation towards further shrinking certificate lifetimes.?/blog/chromes-proposed-90-day-certificate-validity-periodMon, 18 Mar 2024 17:03:14 UTC¶ºÒõ¹Ý¡¯s February 2023 CA/B Forum Recap?| DigicertThe CA/B Forum recently held their face-to-face meeting in Ottawa, Canada. The meeting covered several updates that customers should be aware of, including Chrome¡¯s vision for 90-day certificate validity periods, the implementation of the first S/MIME Baseline Requirements starting this September and proposed malware-based revocation./blog/ca-browser-forum-recap-february-2023Wed, 15 Mar 2023 17:57:53 UTCGoogle¡¯s Moving Forward Together Proposals for Root CA Policy: Rotating ICAs More Frequently | ¶ºÒõ¹ÝAt the last CA/Brower Forum meeting, Chrome outlined its vision for future web PKI policies titled Moving Forward, Together. Notably, Chrome¡¯s vision included 90-day certificate validity periods, which we addressed in-depth in a separate post. However, there are other proposed policies in Chrome¡¯s vision that are relevant for customers to be aware of. /blog/googles-moving-forward-together-proposals-for-root-ca-policyWed, 22 Mar 2023 17:06:37 UTCHow Much Can You Trust ChatGPT? ¨C Establishing Identity and Security While Using AI | ¶ºÒõ¹ÝOver the last few months, we¡¯ve seen an increase in the use of AI and machine learning with the widespread adoption of ChatGPT and other AI tools. The concept of these tools is exciting and can help save time, simplify research and offer 24/7 reliability to do exactly what you ask. /blog/how-much-can-you-trust-chatgptWed, 29 Mar 2023 17:47:47 UTCWhite House National Cybersecurity Strategy ¨C Key Takeaways | ¶ºÒõ¹ÝEarlier this month, the White House released their National Cybersecurity Strategy, demonstrating a heightened focus in the highest levels of government on securing our digital interactions, which, as we¡¯ve seen with recent attacks on critical infrastructure, have tangible impacts on the real world./blog/white-house-national-cybersecurity-strategyThu, 4 Sep 2025 20:56:33 UTCLatest News in Digital Trust ¨C March 2023 | ¶ºÒõ¹Ý¶ºÒõ¹Ý shared its 2022 business highlights, marked by strong growth in revenue and customer acquisition throughout the past year. By addressing customer needs for comprehensive digital trust, ¶ºÒõ¹Ý is executing a vision for best-in-class innovation. /blog/latest-news-in-digital-trust-march-2023Thu, 6 Apr 2023 13:42:43 UTCIoT Day: Celebrating the Power of Connected Devices | ¶ºÒõ¹ÝThe Internet of Things (IoT) describes all of the physical devices that connect to the internet, also known as smart devices, that are revolutionizing the way we live, work and interact with the world around us. /blog/iot-day-the-power-of-connected-devicesFri, 7 Apr 2023 14:33:55 UTCDigital Trust for connected medical devices | ¶ºÒõ¹ÝConnected medical devices, also known as IoMT (Internet of Medical Things), can dramatically improve patient health while minimizing the potential for harm. Infusion pumps illustrate this in a stark fashion. In 2010, Reuters reported more than 50,000 incidents./blog/digital-trust-for-connected-medical-devicesThu, 4 Sep 2025 21:01:01 UTCDomain Registrar or DNS Hosting: The Difference Explained | ¶ºÒõ¹ÝUnderstanding the difference between a registrar and a DNS host can help businesses make informed decisions about their DNS infrastructure./blog/registrar-or-dns-hosting-the-difference-explainedFri, 3 Jan 2025 17:21:40 UTCDNS Commands for Windows | ¶ºÒõ¹ÝLearn DNS Commands for Windows - This resource covers useful commands in Windows Command Prompt and PowerShell with examples and tips./blog/dns-commands-for-windowsMon, 15 May 2023 16:29:19 UTCDyn / Oracle DNS Outage: The Importance of Instant DNS Propagation?| ¶ºÒõ¹ÝSome Dyn services, including DNS (Domain Name System (DNS), will be retired by Oracle starting May 31, 2023. With the impending End of Life (EOL) of these services, many customers are left scratching their heads, saying, ¡°now what?¡±/blog/the-importance-of-instant-dns-propagationMon, 30 Jun 2025 18:10:19 UTC¶ºÒõ¹Ý on Quantum 2: When Will Cryptographically Relevant Quantum Computers Arrive? | ¶ºÒõ¹ÝOnce people understand the threat that quantum computers pose to classical cryptographic algorithms like RSA and ECC, the next question that always gets asked is: when is it likely that such a computer will be available? This was one of the key questions that drove the creation of the ANSI X9 Quantum Risk Study Group./blog/digicert-on-quantum-2-when-will-cryptographically-relevant-quantum-computers-arriveTue, 18 Apr 2023 20:55:41 UTCDNS Hosting, Registration, and Web Hosting.. Aren¡¯t They the Same? | ¶ºÒõ¹ÝThe DNS Made Easy company blog covers industry news and educational articles to help you improve your DNS performance./blog/dns-hosting-registration-web-hostingMon, 15 May 2023 16:30:23 UTCHow to Redirect from One Domain to Another | ¶ºÒõ¹ÝThe ¶ºÒõ¹Ý blog covers industry news and educational articles to help you improve your DNS performance./blog/how-to-redirect-from-one-domain-to-anotherThu, 4 Sep 2025 18:19:21 UTC How to Add a Domain For Managed DNS | ¶ºÒõ¹ÝThis is a step-by-step guide for adding a domain into your account, with and without advanced options. Both methods are simple and quick, and you can always configure advanced DNS options later if you¡¯re not sure what you need right now./blog/how-to-add-a-domain-for-managed-dnsThu, 4 Sep 2025 18:22:21 UTCEnable DNSSEC to Prevent Security Issues | ¶ºÒõ¹Ý/blog/how-to-use-dns-to-prevent-security-issues-dnssecMon, 15 May 2023 16:33:07 UTCWhat are Different Types of Load Balancing | ¶ºÒõ¹ÝLuckily, there are several different types of load balancing to choose from. Each has its own benefits, but all are effective and affordable. With DNS Failover, Round Robin, Weighted Rounded Robin, or Latency Routing, you can easily decide which solution best fits your organization¡¯s unique needs./blog/what-are-different-types-of-load-balancingMon, 15 May 2023 16:34:01 UTCDNS Failover - Standard Practice in 2023 | ¶ºÒõ¹ÝIt's 2023 and the time is now to make DNS failover a standard practice. With growing global connectivity, one of the most important reasons to have DNS failover would be to ensure high availability and reliability of online services and applications./blog/dns-failover-standard-practice-in-2023Mon, 15 May 2023 16:25:04 UTCTTL Best Practices: the Long and Short of It | ¶ºÒõ¹ÝThe DNS Made Easy company blog covers industry news and educational articles to help you improve your DNS performance./blog/long-short-ttlsMon, 15 May 2023 16:35:20 UTCWhy Enable 2FA? | ¶ºÒõ¹ÝWhat is Two-factor authentication? (2FA) utilizes an additional form of identity verification on top of the password to help ensure personal information remains secure. Learn benefits and how to enable 2FA./blog/why-enable-2faMon, 15 May 2023 16:36:03 UTCWhat is DNS Forwarding | ¶ºÒõ¹ÝDNS forwarding allows network administrators to separate the handling of internal and external DNS queries,which can improve security and network performance./blog/understanding-dns-forwardingMon, 15 May 2023 16:36:58 UTCDDoS Protection and Mitigation with DNS | ¶ºÒõ¹ÝLearn how DNS can prevent DDoS attacks and mitigate issues with secondary DNS, Failover, and monitoring tools through DNS Made Easy./blog/ddos-protection-and-mitigation-with-dnsMon, 15 May 2023 16:38:03 UTCHow Does CNAME Flattening Work? | ¶ºÒõ¹ÝThe DNS Made Easy company blog covers industry news and educational articles to help you improve your DNS performance./blog/how-does-cname-flattening-workMon, 15 May 2023 16:38:41 UTC¶ºÒõ¹Ý Releases Innovative Automated Testing Tool for Digital Certificates | ¶ºÒõ¹Ý¶ºÒõ¹Ý is pleased to announce the release of a new certificate linter, known as pkilint, which builds on industry experience in automating compliance checks for digital certificates. This first release of pkilint implements compliance testing for the recently released CA/Browser Forum/blog/digicert-releases-automated-testing-tool-for-digital-certificatesWed, 16 Aug 2023 13:51:11 UTCDNS Security 2022 - Best Practices to Prevent DDoS Attacks | ¶ºÒõ¹ÝThis white paper explains Best practices to prevent different DDoS attacks through managed DNS provider solutions./blog/dns-security-2022-best-practices-and-solutionsMon, 15 May 2023 16:39:41 UTCWhat is DNS Monitoring and Why You Need It | ¶ºÒõ¹ÝThe DNS Made Easy company blog covers industry news and educational articles to help you improve your DNS performance./blog/what-is-dns-monitoringMon, 15 May 2023 16:40:20 UTCGetting a handle on your crypto assets to prepare for PQC | ¶ºÒõ¹ÝQuantum computing¡¯s impending arrival is exposing what cryptography experts already know: Crypto is everywhere. Almost everything that implements modern security practices relies on cryptography and PKIs./blog/preparing-for-the-quantum-resistant-cryptography-transitionTue, 19 Dec 2023 13:11:04 UTCLatest News in Digital Trust ¨C April 2023 | ¶ºÒõ¹Ý¶ºÒõ¹Ý announced our new unified partner program, designed to provide new and existing partners with a comprehensive portfolio that delivers digital trust for the real world. /blog/latest-news-in-digital-trust-april-2023Mon, 15 May 2023 16:41:20 UTCAt ¶ºÒõ¹Ý, Compliance is Not an Afterthought | ¶ºÒõ¹ÝCompliance is a key building block of digital trust, and thus for us, compliance is not an afterthought, but an integral part of our product and service development process. Before the development train leaves the station, our compliance specialists are involved./blog/digicert-certified-on-soc2Thu, 18 May 2023 14:15:13 UTCCNAME Records Common Use Cases and Benefits | ¶ºÒõ¹ÝIn 2023, online businesses and applications should use CNAME DNS records for several reasons including: flexibility, redundancy, and load balancing. CNAME records are ideal for simplifying DNS record management for a domain, instead of having to update multiple A records whenever an IP address changes, you can easily update a single CNAME record and point to a new domain./blog/cname-records-common-use-cases-and-benefitsMon, 15 May 2023 19:24:22 UTCMulti-CDN Strategies with ¶ºÒõ¹Ý Constellix DNS | ¶ºÒõ¹ÝWith ¶ºÒõ¹Ý Constellix DNS¡¯ Multi-CDN, instead of relying on a single CDN provider, multiple CDN providers are used to serve content to end-users. This improves content delivery performance and reliability by distributing traffic across multiple CDN providers and their respective networks./blog/multi-cdn-strategies-in-2023Mon, 15 May 2023 19:45:53 UTCGlobal DNS Network Benefits | ¶ºÒõ¹ÝGlobal DNS Network Benefits - DNS Made Easy Blog/blog/global-dns-network-benefitsMon, 15 May 2023 20:06:07 UTCNew Gmail Feature Improves Marketing and Helps Fight Fraud | ¶ºÒõ¹ÝGoogle recently announced expanded support in Gmail for the Brand Indicators for Message Identification (BIMI) email specification. The phrase ¡°email specification¡± probably doesn¡¯t move you to the edge of your seat./blog/new-gmail-feature-improves-marketing-and-fights-fraudFri, 13 Dec 2024 20:16:06 UTCCybersecurity essentials for safe summer travel | ¶ºÒõ¹ÝWhether you¡¯re a regular business traveler or one of the millions of summer vacationers just looking to get away, these five digital trust tips will help you stay secure on the go./blog/how-to-travel-cyber-securely-this-summerFri, 26 Jul 2024 14:22:17 UTCDelivering Digital Trust to Home Automation and Robotics Software | ¶ºÒõ¹ÝWe are quickly moving in a Jetsons direction with home automation and robotics. Over the last decade, home robotics such as smart thermostats, lighting controls and door cams ¡ª all of which may be controlled by an app on your phone ¡ª have become commonplace./blog/delivering-digital-trust-to-home-automation-and-roboticsThu, 21 Sep 2023 19:17:48 UTCThe Importance of Digital Trust in The Era of Web 3?| ¶ºÒõ¹ÝFor better or for worse, every aspect of our lives today is digitally connected ¨C from how we socialize to working remotely to even connected health devices. Yet, as we constantly engage online, how do we know that our footprint in the digital world is secure?/blog/importance-of-digital-trust-for-web3Thu, 4 Sep 2025 21:20:36 UTCAnnouncing ¶ºÒõ¹Ý CertCentral¡¯s New KeyLocker | ¶ºÒõ¹ÝAs companies struggle to ensure compliance with new CA/Browser Forum requirements that all code signing private keys be stored in FIPS 140-2 compliant hardware, ¶ºÒõ¹Ý announces?a new capability called ¶ºÒõ¹Ý KeyLocker to address these requirements/blog/announcing-certcentrals-new-keylockerThu, 1 Jun 2023 16:29:30 UTCAnnouncing New Threat Detection Capability in ¶ºÒõ¹Ý? Software Trust Manager | ¶ºÒõ¹Ý¶ºÒõ¹Ý? Software Trust Manager now includes threat detection capabilities to detect software threats and vulnerabilities./blog/threat-detection-capability-with-software-trust-managerFri, 2 Feb 2024 13:25:00 UTCDriving Digital Trust in Electric Vehicle Charging | ¶ºÒõ¹ÝJust like airbags protect vehicle occupants, digital trust plays a vital role in safeguarding EVs and their users during charging operations. As electric vehicles (EVs) become increasingly popular, the importance of digital trust in the charging process cannot be overlooked/blog/digital-trust-in-electric-vehicle-chargingTue, 13 Jun 2023 19:56:51 UTCWhy Short-Lived Certificates & Automation Can Be Beneficial | ¶ºÒõ¹ÝShorter certificate lifetimes are intended to increase security and solve problems like smoother revocation and enabling policy agility. Minimizing the window of opportunity for potential attackers to exploit compromised certificates./blog/short-lived-certificates-and-automationFri, 8 Sep 2023 12:37:55 UTC¶ºÒõ¹Ý¡¯s June 2023 CA/Browser Forum Recap | ¶ºÒõ¹ÝAs usual, ¶ºÒõ¹Ý attended the CA/Browser Forum meeting hosted by Microsoft this June, and we are sharing the key takeaways that are relevant for our customers and partners./blog/ca-browser-forum-recap-june-2023Wed, 21 Jun 2023 15:00:33 UTC3 things healthcare organizations should expect from a managed DNS service | ¶ºÒõ¹ÝDNS is the first step in any communication on the internet, determining the availability and speed of a customer¡¯s first interaction with applications or content. It¡¯s obvious why DNS services are so crucial for e-commerce companies. /blog/3-things-healthcare-organization-should-expect-from-managed-dnsThu, 29 Jun 2023 15:18:02 UTCFinancial Institutions: Prove your identity and increase your brand presence with a Verified Mark Certificate | ¶ºÒõ¹ÝVerified Mark Certificates (VMCs) by Gmail, Apple Mail and additional mailbox providers has made it harder for fraudsters to impersonate banks and other financial services firms by showing a blue check mark and/or certifying language for verified senders. /blog/financial-institutions-and-verified-mark-certificatesFri, 13 Dec 2024 20:14:04 UTCHow Will Quantum Computing Impact IoT Security? | ¶ºÒõ¹ÝQuantum computers?could break many of the encryption algorithms currently used to secure digital trust. Thus, we¡¯re exploring how quantum computing will impact security of various interactions./blog/how-will-quantum-computing-impact-iot-securityThu, 4 Sep 2025 18:18:37 UTCLatest News in Digital Trust: June 2023 | ¶ºÒõ¹Ý¶ºÒõ¹Ý has partnered with ReversingLabs, a leading software supply chain security company, to strengthen software security. This collaboration will merge ReversingLabs' advanced binary analysis and threat detection capabilities with ¶ºÒõ¹Ý's secure code signing solution./blog/latest-news-in-digital-trust-june-2023Tue, 11 Jul 2023 13:26:09 UTCKeeping certificate management on track through mergers and acquisitions | ¶ºÒõ¹ÝWith its new National Cybersecurity Strategy, the Biden administration is doubling down on moving the Federal government to a zero trust security architecture, following last year¡¯s mandate to set specific zero trust goals./blog/keeping-certificate-management-on-trackTue, 11 Jul 2023 13:50:30 UTCIt¡¯s Time to Start Mapping Out Your Post-Quantum Cryptography Transition Strategy?| ¶ºÒõ¹ÝWhile it is uncertain when exactly quantum computers will arrive on the scene, it is certain that they will. In 2022, the NIST (National Institute of Standards and Technology (NIST) announced four candidate algorithms for post-quantum cryptography./blog/mapping-out-your-post-quantum-cryptography-transition-strategyWed, 13 Sep 2023 15:12:05 UTCTom Klein | ¶ºÒõ¹ÝTom Klein is the Senior Director of IoT Business Development at ¶ºÒõ¹Ý. He has 40+ years in IT with a specialty in IoT Security. He has had extended tenure with IBM, Microsoft, AWS, and security specialty organizations./blog/tom-kleinTue, 25 Apr 2023 14:14:55 UTCThe U.S. Cyber Trust Marks | ¶ºÒõ¹Ý.The new "U.S. Cyber Trust Mark" aims to better empower consumers by putting cybersecurity information at their fingertips, similar to a nutrition label. IoT security labels could be revolutionary for assuring users of digital trust. /blog/the-us-cyber-trust-marksFri, 21 Jul 2023 12:18:17 UTCHow to Achieve Software Trust? 3 Industry Experts Offer 3 Best Practices | ¶ºÒõ¹ÝA recent ¶ºÒõ¹Ý-sponsored webinar titled Digital Trust in Software Supply Chains & AI Models, addressed the challenges in preventing software supply chain attacks. Hosted by ¶ºÒõ¹Ý CEO Amit Sinha, it featured three industry-recognized experts in the space./blog/how-to-achieve-software-trust-3-best-practicesThu, 21 Sep 2023 19:16:46 UTCSafeguarding Connected Families: The Role of Cybersecurity Labeling in a Secure Future | ¶ºÒõ¹ÝConnected devices, often referred to as "smart" devices, have become an integral part of our lives, offering convenience and efficiency. However, they also introduce potential security and privacy risks that can impact our families. /blog/the-role-of-cybersecurity-labeling-in-a-secure-futureTue, 25 Jul 2023 13:14:09 UTCHelping Users Avoid Account Takeover | ¶ºÒõ¹ÝAccount takeover fraud is a massive source of losses for e-commerce businesses and retail banks. According to the 2022 Identity Fraud Study by Javelin Strategy & Research, losses from account takeover totaled $11.4B./blog/helping-users-avoid-account-takeoverFri, 13 Dec 2024 20:10:13 UTCDigital Trust in the Emergency Lane: Securing NG9-1-1 Systems | ¶ºÒõ¹ÝNext Generation 9-1-1 (NG9-1-1) systems are revolutionizing emergency communication infrastructure, enabling more efficient and effective emergency response. Let's explore the potential risks and consequences of neglecting digital trust./blog/digital-trust-in-the-emergency-laneWed, 2 Aug 2023 14:59:20 UTCHow secure is your software??| ¶ºÒõ¹ÝAccording to Cybersecurity Drive, a study by Gartner found that new software contains 40% to 80% of code from third parties. These include runtime, libraries, components and software development kits (SDKs). /blog/how-secure-is-your-softwareThu, 21 Sep 2023 19:12:55 UTCLatest News in Digital Trust: July 2023 | ¶ºÒõ¹ÝGoogle is testing its Med-PaLM 2 AI chat technology, based on the PaLM 2 language model, at the Mayo Clinic and other hospitals. Med-PaLM 2 has been trained on medical licensing exam questions and medical expert demonstrations. /blog/latest-news-in-digital-trust-july-2023Thu, 3 Aug 2023 13:08:44 UTCHow Will Quantum Computing Impact Healthcare Security???| ¶ºÒõ¹ÝQuantum computers?will change the way many industries operate, and?the impacts of quantum computing will affect all aspects of society.?Quantum computers could be used to solve complex problems faster and more accurately than traditional computers/blog/how-will-quantum-computing-impact-healthcare-securityThu, 5 Oct 2023 14:35:54 UTCHow Digital Trust Is Revolutionizing Diabetes Care | ¶ºÒõ¹ÝMike Nelson, ¶ºÒõ¹Ý¡¯s vice president of Digital Trust, knows the struggles of living with diabetes all too well. As a teenager, Mike was diagnosed with type 1 diabetes./blog/how-digital-trust-enables-safe-diabetes-monitoringFri, 12 Apr 2024 04:35:10 UTC¶ºÒõ¹Ý Champions PQC, Automation and Supply Chain Security at IETF | ¶ºÒõ¹ÝThe Internet Engineering Task Force (IETF) is the organization that sets the standards for the internet, including well known standards like TLS and S/MIME. IETF meets regularly with participants from all over the world three times a year. /blog/digicert-champions-pqc-automation-and-supply-chain-securityMon, 18 Dec 2023 18:38:41 UTCTransforming Engineering and Architectural Submissions with Digital Trust | ¶ºÒõ¹ÝThe process for preparing engineering blueprints, calculations and other materials for submission to government agencies historically required special printers, traditional ink stamps, signatures and reams of paper. In early attempts to digitize this process, the approach remained almost identical./blog/digital-trust-transforming-engineering-and-architectural-submissionsThu, 5 Oct 2023 14:35:24 UTCNIST Releases Quantum-safe Cryptography Standards: What Happens Now? | ¶ºÒõ¹ÝCryptography is crucial to digital trust - from online banking and cloud infrastructure to iPhone backups and digitally signed documents. The cryptography behind these interactions enables us to trust them as authentic./blog/nist-pqc-standards-are-hereThu, 24 Aug 2023 21:11:18 UTCLatest News in Digital Trust: August 2023 | ¶ºÒõ¹Ý¶ºÒõ¹Ý announced the expansion of its certificate management platform, ¶ºÒõ¹Ý Trust Lifecycle Manager, to provide full lifecycle support for multiple CAs including Microsoft CA and AWS Private CA, as well as integration with ServiceNow./blog/latest-news-in-digital-trust-august-2023Fri, 5 Sep 2025 13:47:34 UTCThe New C-Suite Position: Chief Trust Officer | ¶ºÒõ¹ÝIn 2022, Forrester predicted that the Chief Trust Officer role would organically evolve from the position, and they anticipated that 15 companies within the Global 500 would appoint a Chief Trust Officer in the following year.??/blog/new-c-suite-position-chief-trust-officerMon, 18 Dec 2023 18:37:09 UTCThe Impact of Quantum Computers on the Finance Sector | ¶ºÒõ¹ÝQuantum computers?will change the way many industries operate, and?the impacts of quantum computing will affect all aspects of society.?It¡¯s not a question of if but when as governments and private companies race towards their development./blog/impact-of-quantum-computers-on-the-finance-sectorTue, 19 Sep 2023 18:25:05 UTCThe Hidden Certificates in Your Organization: How to Find Them | ¶ºÒõ¹ÝAt first glance, the most obvious way a CLM solution can discover certificates is through tight coupling with the CA that built the solution. ¶ºÒõ¹Ý Trust Lifecycle Manager can discover public certificates issued by ¶ºÒõ¹Ý CertCentral and private certificates./blog/how-many-ways-can-your-clm-solution-discover-certificatesTue, 12 Dec 2023 02:33:49 UTC¶ºÒõ¹Ý Trust Summit Preview with Stacey Higginbotham: Navigating IoT's Future with Matter Protocol | ¶ºÒõ¹ÝIoT device security got a big boost last year with the launch of the Matter smart home interoperability standard. Not only will certain IoT devices interoperate, but they will also be more secure. The Matter standard is designed for a variety of devices./blog/digicert-2023-trust-summit-guest-blogThu, 4 Sep 2025 21:47:47 UTCThe Future Role of AI in Cybersecurity | ¶ºÒõ¹ÝAI is one of the foundations of digital trust and can really expand it, as long as we take the right precautions. The use of technologies such as Public Key Infrastructure (PKI) can play a fundamental role in protecting against emerging AI-related threats./blog/the-future-role-of-ai-in-cybersecurityThu, 4 Sep 2025 18:18:37 UTCNational Cyber Security Awareness Month: October 2024?| ¶ºÒõ¹ÝNational Cybersecurity Awareness Month (NCSAM) is a collaborative initiative between the government and private industry in the United States and European Union/blog/national-cyber-security-awareness-month2Fri, 5 Sep 2025 13:47:24 UTC5 Key Takeaways from the FS-ISAC FinCyber Today Summit | ¶ºÒõ¹ÝFinancial firms are facing increasing pressure to offer more online banking services and convenience to consumers while maintaining high security and compliance with storing customer data./blog/5-key-takeaways-from-fincyber-today-summitWed, 4 Oct 2023 14:30:08 UTC4 best practices for bulk email senders | DIgiCert4 Best Practices For Bulk Email Senders./blog/google-yahoo-announces-new-bulk-email-requirementsThu, 11 Sep 2025 21:04:15 UTCAre Hackers Able to Extract Your Private RSA Keys from SSH Connections? | ¶ºÒõ¹Ý BlogWorried about hackers extracting your private RSA keys? Check out this blog to learn how signatures could alert hackers and how to prevent them by default./blog/are-hackers-able-to-extract-private-rsa-keys-from-ssh-connectionsThu, 4 Sep 2025 18:18:37 UTCThe 3 Keys To Automated Certificate Lifecycle Management | ¶ºÒõ¹ÝLet¡¯s explore why automated certificate lifecycle management (CLM) is moving from nice-to-have to a necessity which make it possible for network admins to successfully manage the massive number of certificates they¡¯re responsible for./blog/3-keys-to-automated-certificate-lifecycle-managementFri, 5 Sep 2025 13:47:14 UTCCA/Browser Forum ballot to extend CAA to S/MIME?| ¶ºÒõ¹ÝThe CA/Browser Forum has started a ballot that will require Certificate Authorities (CAs) to adopt CA Authorization (CAA) processing for email addresses included in S/MIME certificates.?/blog/ca-browser-forum-introduces-caa-to-smimeFri, 5 Sep 2025 13:47:15 UTCSEC Adopts Cybersecurity Risk Regulation | ¶ºÒõ¹ÝLooking to protect investors, the SEC¡¯s new requirements hold companies responsible for data breaches. This means that CISOs are ultimately liable for organizational incursions and data theft. /blog/sec-adopts-new-mandates-on-cybersecurity-disclosureFri, 9 May 2025 15:11:55 UTCIs Kyber Vulnerable? A Look At The Math And Implementation?| ¶ºÒõ¹ÝRecent reports indicate the Kyber ML-KEM protection against post-quantum cryptography (PQC) has a serious flaw. The full picture is more complicated./blog/is-kyber-vulnerable-look-at-the-math-and-implementationFri, 5 Sep 2025 13:47:42 UTCReflections And Projections On DNS¡¯s Role In Digital Trust | ¶ºÒõ¹ÝDNS has progressed to keep up with changes to the internet, use cases, and security threats. And it¡¯s become central to digital trust./blog/dns-reflections-and-projectionsFri, 5 Sep 2025 13:47:40 UTCState of Digital Trust 2024 | ¶ºÒõ¹ÝIn 2022, ¶ºÒõ¹Ý¡¯s first report on the State of Digital Trust revealed that 100% of the leaders surveyed understood the vital role digital trust plays in their organizations¡¯ cyber health./blog/state-of-digital-trust-2024Fri, 5 Sep 2025 13:47:24 UTCMaking Smart Homes Smarter: How TUO Adds Security To Every Device | ¶ºÒõ¹ÝTUO makes smart home products that are stunningly designed¡ªfrom the Matter-certified security inside to their elegantly unobtrusive outside. The products we tested paired immediately, with exceptional customization./blog/making-smart-homes-smarter-with-tuoFri, 5 Sep 2025 13:47:19 UTCOvercoming The Hurdles To S/MIME Adoption?| ¶ºÒõ¹ÝA major player in the war against email fraud is Secure/Multipurpose Internet Mail Extensions (S/MIME), an internet standard that digitally signs and encrypts email messages./blog/overcoming-the-hurdles-to-smime-adoptionFri, 5 Sep 2025 13:47:36 UTCThe Entrust distrust: Key takeaways for CAs and organizations | ¶ºÒõ¹ÝThe average web user may not realize how much work goes on behind the scenes to keep the digital world secure. But trustworthy websites, emails, servers, and software are made trustworthy by digital certificates./blog/key-takeaways-from-the-entrust-incidentFri, 5 Sep 2025 13:47:29 UTCCRN 5-Star Program Winner for 2024 | ¶ºÒõ¹ÝFor its 2024 Partner Program Guide, CRN evaluated more than 280 IT vendors, naming those at the top of the pack as 5-Star Program Winners./blog/crn-5-star-program-winner-for-2024Fri, 5 Sep 2025 13:47:12 UTCThe Entrust distrust: Key takeaways for CAs and organizations | ¶ºÒõ¹ÝThe average web user may not realize how much work goes on behind the scenes to keep the digital world secure. But trustworthy websites, emails, servers, and software are made trustworthy by digital certificates./blog/avoiding-disruptions-from-revoked-certificatesThu, 18 Jul 2024 20:12:13 UTCThe Challenges Of Achieving Crypto-Agility For Private Keys | ¶ºÒõ¹Ý¶ºÒõ¹Ý recently sponsored a Ponemon survey that revealed 61% of IT leaders are concerned their organizations are unprepared to address the security implications of quantum computing./blog/managing-private-keys-in-a-pqc-worldFri, 5 Sep 2025 13:47:33 UTCInnovation: The Bedrock Of Digital Trust?| ¶ºÒõ¹ÝAs the digital world continues to grow and change, innovating solutions in the cybersecurity space becomes more important for providers of digital trust./blog/innovation-the-bedrock-of-digital-trustFri, 5 Sep 2025 13:47:37 UTCWhy Q-Day Is Closer Than You Think?| ¶ºÒõ¹ÝQuantum computing has amazing promise for the planet. If you¡¯ve been keeping up with the conversations about quantum, you¡¯ve probably heard about Q-Day./blog/why-q-day-is-closer-than-you-thinkThu, 18 Apr 2024 16:30:05 UTCWhy Compliance Is The Foundation Of Digital Trust | ¶ºÒõ¹ÝCompliance isn¡¯t just about crossing T¡¯s and dotting I¡¯s. It¡¯s about putting standards in place that protect the entire connected world and build digital trust./blog/compliance-the-foundation-of-digital-trustFri, 5 Sep 2025 13:47:13 UTC6 Reasons Why Signed SBOMs Are Essential To Software Security | ¶ºÒõ¹ÝIf you want software trust, you need a signed SBOM for every piece of software you create. Keep reading for the six reasons why this should be a top priority./blog/6-reasons-why-signed-sboms-are-essential-to-software-securityFri, 5 Sep 2025 13:47:29 UTCUnlocking Device Trust Manager | IOT Device Manager | ¶ºÒõ¹ÝDevice Trust Manager. As the digital landscape continues to evolve, securing connected devices has become more critical than ever./blog/unlocking-device-trust-managerFri, 5 Sep 2025 13:47:38 UTCDriving digital trust with SOC 2-compliant DNS | ¶ºÒõ¹ÝThe Domain Name System (DNS) is the internet¡¯s backbone, critical to the smooth operation of the online functions performed by millions of people and businesses every day. /blog/digital-trust-with-soc-2-compliant-dnsFri, 5 Sep 2025 13:47:43 UTCWhat Is A Certificate Authority's Role In Delivering Digital Trust? | ¶ºÒõ¹ÝWhen a certificate authority (CA) signs a digital certificate, that signature serves as an attestation that the CA has verified the identity and public key of the certificate holder./blog/ca-role-in-delivering-digital-trustFri, 5 Sep 2025 13:47:15 UTCThe NIST standards for quantum-safe cryptography | ¶ºÒõ¹ÝFor nearly a decade, the world¡¯s leading cryptographers have been collaborating with the National Institute of Standards and Technology (NIST) to create new algorithms to safeguard us./blog/nist-standards-for-quantum-safe-cryptographyFri, 7 Feb 2025 16:22:23 UTCHow To Troubleshoot DNS Issues For Security And Performance | ¶ºÒõ¹Ý We¡¯ve put together some tips for measuring DNS performance and diagnosing common issues to protect against threats and deliver a positive UX./blog/how-to-troubleshoot-dns-issues-for-security-and-performanceFri, 7 Feb 2025 16:21:06 UTCAn In-Depth Look At The NIST PQC Algorithms | ¶ºÒõ¹ÝOne crucial detail missing from many of the conversations around NIST¡¯s long-awaited release of the final specifications for several post-quantum cryptography (PQC) algorithms/blog/in-depth-look-at-the-nist-pqc-algorithmsFri, 5 Sep 2025 13:47:17 UTCThe High Opportunity Cost Of Legacy PKI | ¶ºÒõ¹ÝEnterprise application outages due to digital certificate errors aren't just frustrating¡ªthey're costly especially when you¡¯re working with a legacy public key infrastructure (PKI) system./blog/legacy-pkiFri, 5 Sep 2025 13:47:22 UTCSolving The Revocation Gap With Short-Lived Certificates | ¶ºÒõ¹ÝCertificates with short lifespans could be the answer, but they come with their own challenges. Let's look at how short-lived certificates work and what managing them means for organizations./blog/solving-short-lived-certificatesFri, 5 Sep 2025 13:47:10 UTCUnlocking a competitive advantage with CRA compliance | ¶ºÒõ¹ÝThe EU Cyber Resilience Act (CRA), a game-changing legal framework that will set bold new standards for every digital product in the European market./blog/unlocking-a-competitive-advantage-with-cra-complianceFri, 5 Sep 2025 13:47:18 UTCWhy Recent Chinese Encryption Research Isn¡¯t A Threat¡ªYet?| ¶ºÒõ¹ÝShanghai University researchers published a paper in the Chinese Journal of Computers. The study revolved around the researchers¡¯ successful use of a D-Wave quantum annealing machine./blog/recent-chinese-encryption-threat-researchFri, 7 Feb 2025 15:26:00 UTCFDA-Ready Security With ¶ºÒõ¹Ý And FOSSA | ¶ºÒõ¹Ý¶ºÒõ¹Ý and Software Composition Analysis/SBOM management platform FOSSA have come together to make managing FDA cybersecurity compliance much faster, easier, and more scalable./blog/fda-ready-security-with-digicert-and-fossaFri, 5 Sep 2025 13:47:21 UTCAnnouncing the GA release of ¶ºÒõ¹Ý Device Trust Manager | ¶ºÒõ¹Ý¶ºÒõ¹Ý will launch the General Availability (GA) of ¶ºÒõ¹Ý Device Trust Manager. The release marks a significant milestone in delivering digital trust solutions./blog/the-ga-release-of-device-trust-managerFri, 5 Sep 2025 13:47:30 UTCFIPS 140-3 Certification Unlocked For ¶ºÒõ¹Ý TrustCore SDK | ¶ºÒõ¹ÝDeveloped by the NIST, the Federal Information Processing Standard (FIPS) 140-3 serves as the gold standard for cryptographic modules. /blog/fips-140-3-certification-for-digicert-trustcore-sdkFri, 5 Sep 2025 13:47:17 UTC4 Steps To Secure The IIoT Device Lifecycle | ¶ºÒõ¹ÝThe Industrial Internet of Things (IIoT) spans a wide range of smart sensors and networked devices, providing data and analytics that enable manufacturers to improve efficiency./blog/4-steps-to-secure-the-iiot-device-lifecycleFri, 5 Sep 2025 13:47:43 UTCWhy Certificate Automation Is An Absolute Must | ¶ºÒõ¹ÝThe goal of shortening certificate lifespans is to promote automation, and Apple isn¡¯t the only one pushing for it¡ªGoogle proposed a 90-day certificate validity period in 2023./blog/why-certificate-automation-is-an-absolute-mustFri, 5 Sep 2025 13:47:44 UTCMaking Smart Homes Smarter: How arre Adds Security To Every Device | ¶ºÒõ¹Ýarre makes smart home products that are stunningly designed¡ªfrom the Matter-certified security inside to their elegantly unobtrusive outside. The products we tested paired immediately, with exceptional customization./blog/making-smart-homes-smarter-with-arreFri, 22 Nov 2024 15:27:07 UTCSmartHR: A ¶ºÒõ¹Ý Mark Certificate success story | ¶ºÒõ¹Ý/blog/smarthr-a-digicert-mark-certificate-success-storyFri, 7 Feb 2025 15:05:58 UTCTracking the progress toward post-quantum cryptography | ¶ºÒõ¹ÝThe National Institute of Standards and Technology (NIST) has been leading efforts to standardize post-quantum cryptography (PQC) algorithms. /blog/the-progress-toward-post-quantum-cryptographyFri, 7 Feb 2025 15:05:17 UTC6 actionable ways to secure the IIoT at every stage | ¶ºÒõ¹ÝMillions of connected devices now form the backbone of critical infrastructure, making the security stakes higher than ever. That¡¯s why security in the IIoT is a non-negotiable./blog/the-iiot-security-field-guideFri, 7 Feb 2025 15:03:36 UTCHow Artificial Intelligence Is Reshaping Digital Trust | ¶ºÒõ¹ÝAs our reliance on technology grows¡ªand as artificial intelligence (AI) becomes more deeply embedded in our lives¡ªtrust is being tested like never before. /blog/how-ai-is-reshaping-digital-trustFri, 5 Sep 2025 13:47:18 UTCHow To Spot A Fraudulent Website?| ¶ºÒõ¹ÝFrom phishing scams and counterfeit eCommerce stores to fake login pages that harvest your credentials, fraudulent websites are getting more sophisticated by the day./blog/how-to-identify-fraudulent-websitesFri, 5 Sep 2025 13:47:21 UTCAnnouncing The New Open-Source DCV Library From ¶ºÒõ¹Ý | ¶ºÒõ¹ÝPerforming quality DCV is in the interest of the entire internet ecosystem. That¡¯s why we¡¯ve released our automated DCV system as an open-source project./blog/new-open-source-dcv-library-from-digicertFri, 5 Sep 2025 13:47:36 UTCWhat CAs And Organizations Can Learn From The Entrust Incident | ¶ºÒõ¹ÝMozilla¡¯s distrust of Entrust roots isn't limited to Firefox¡ªit has the potential to trickle down to a number of platforms and applications. /blog/ripple-effect-of-mozillas-distrust-of-entrust-rootsFri, 5 Sep 2025 13:47:23 UTCSecuring The Future Of Industry X.0 | ¶ºÒõ¹ÝThe EU Cyber Resilience Act (CRA), a game-changing legal framework that will set bold new standards for every digital product in the European market./blog/securing-the-future-of-industry-x0Fri, 5 Sep 2025 13:47:40 UTCPKIlint and the Path to Interoperable, Quantum-Safe PKI | ¶ºÒõ¹ÝWithout interoperability, the adoption of new cryptographic algorithms would lead to isolated silos of incompatible systems, breaking the seamless interactions./blog/pkilint-and-the-path-to-interoperable-quantum-safe-pkiFri, 5 Sep 2025 13:47:26 UTCMeeting Compliance Standards With ¶ºÒõ¹Ý TrustCore SDKCompliance with standards like FIPS, export controls, the EU Cyber Resilience Act (EUCRA), UK Product Security and Telecommunications Infrastructure (PSTI), and various international cybersecurity regulations is critical for protecting data./blog/compliance-standards-with-digicert-trustcore-sdkFri, 5 Sep 2025 13:47:39 UTCPutting Heart Into Security With ¶ºÒõ¹Ý? TrustCore SDK | ¶ºÒõ¹Ý¶ºÒõ¹Ý TrustCore SDK is designed to provide developers with the tools they need to secure their devices, whether they¡¯re working on consumer electronics or critical industrial systems./blog/putting-heart-into-security-with-digicert-trustcore-sdkFri, 5 Sep 2025 13:47:25 UTCBringing Stability to an Uncertain World | ¶ºÒõ¹ÝBuckle up for yet another massive change: the sale of Entrust¡¯s public certificate business to Sectigo¡ªone of the now-distrusted certificate authority¡¯s biggest competitors./blog/bringing-stability-to-an-uncertain-worldFri, 31 Jan 2025 01:09:14 UTCNavigating Compliance in the Industrial Internet of Things | ¶ºÒõ¹ÝIn this guide, we¡¯ll break down the essential standards for IIoT compliance and provide actionable steps to meet these requirements effectively./blog/navigating-compliance-in-the-iiotFri, 5 Sep 2025 13:47:38 UTCHow the X9 PKI Puts Financial Institutions in Control | ¶ºÒõ¹Ý¶ºÒõ¹Ý and many financial institutions have spent the past few years working with ASC X9 to develop a financial services-specific PKI¡ªone that provides more control./blog/how-the-x9-pki-puts-financial-institutions-in-controlMon, 17 Mar 2025 18:44:44 UTCThe Swiss Army Knife of Embedded Security | ¶ºÒõ¹ÝThis technical deep dive explores the architecture of TrustCore SDK, its components, and how it streamlines security integration, for developers working on IoT./blog/the-swiss-army-knife-of-embedded-securityFri, 5 Sep 2025 13:47:20 UTCIoT and the Future of Environmental Sustainability | ¶ºÒõ¹ÝThe Internet of Things (IoT) might seem worlds apart from the untamed beauty of the forest. But IoT is proving to be one of the most powerful tools we have./blog/iot-and-future-environmental-sustainabilityWed, 26 Feb 2025 17:03:12 UTCHow Apple¡¯s Entrust Root Distrust Impacts Brand And Email Trust | ¶ºÒõ¹ÝIn 2024, Google, Mozilla, and Apple stopped supporting TLS certificates that were issued on Entrust roots after November 2024. Apple went a step further, widening its distrust./blog/how-apples-entrust-root-distrust-impacts-brand-and-email-trustFri, 5 Sep 2025 13:47:39 UTCSimplifying Matter Certification with ¶ºÒõ¹Ý and Panasonic | ¶ºÒõ¹ÝMatter, the industry standard backed by the biggest names in smart home tech like Panasonic. But for manufacturers: Matter compliance isn¡¯t just a feature¡ªit¡¯s a requirement./blog/simplifying-matter-certification-with-digicert-and-panasonicFri, 5 Sep 2025 13:47:31 UTCHow to Avoid Critical Service Outages | ¶ºÒõ¹ÝWhat we're witnessing with the Chromecast incident isn't an isolated case¡ªit's a symptom of an industry-wide approach that's becoming increasingly untenable./blog/addressing-the-chromecast-certificate-expirationThu, 27 Mar 2025 16:45:03 UTC¶ºÒõ¹Ý Named a CRN 5-Star Partner Program Winner for 2025 | ¶ºÒõ¹ÝWe¡¯re proud to announce that ¶ºÒõ¹Ý has once again been named a CRN 5-Star Program DRAWinner, reaffirming our commitment to delivering best-in-class digital trust solutions./blog/digicert-named-a-crn-5-star-partner-program-winner-for-2025Fri, 5 Sep 2025 13:47:13 UTCDNS Meets PKI in the Most Powerful Platform for Digital Trust | ¶ºÒõ¹Ý¶ºÒõ¹Ý ONE, the first-ever platform to combine public key infrastructure (PKI) and Domain Name System (DNS) management into a single unified solution. /blog/dns-meets-pki-for-digital-trustFri, 5 Sep 2025 13:47:37 UTC47 Days: The New Certificate Lifetime Proposed by Apple | ¶ºÒõ¹ÝApple proposed changes to the Baseline Requirements for TLS Server Certificates of the Server Certificate Working Group of the CA/Browser Forum. /blog/new-certificate-lifetime-proposed-by-appleFri, 5 Sep 2025 13:47:35 UTCTLS Certificate Lifetimes Will Officially Reduce to 47 Days | ¶ºÒõ¹ÝThe CA/Browser Forum has officially voted to amend the TLS Baseline Requirements to set a schedule for shortening both the lifetime of TLS certificates./blog/tls-certificate-lifetimes-will-officially-reduce-to-47-daysFri, 16 May 2025 13:37:23 UTCPreparing for Quantum and Shorter Certificate Lifespans | ¶ºÒõ¹ÝThe path to quantum readiness also prepares you for shortened certificate lifespans. These aren¡¯t two completely disparate challenges; they¡¯re converging forces./blog/preparing-for-quantum-and-shorter-certificate-lifespansWed, 23 Apr 2025 16:46:08 UTCUnlocking Crypto-Agility: Simplifying PKI Management with ¶ºÒõ¹Ý and HashiCorp | ¶ºÒõ¹Ý¶ºÒõ¹Ý Trust Lifecycle Manager (TLM) integrates with HashiCorp¡¯s Vault Enterprise Secrets Engine to streamline Public Key Infrastructure (PKI) management./blog/unlocking-cryptoagility-and-simplifying-pki-managementFri, 5 Sep 2025 13:47:12 UTCWhen Should You Use The X9 PKI? | ¶ºÒõ¹ÝThe Accredited Standards Committee (ASC) X9 has introduced the X9 Financial PKI, specifically designed to meet the needs of financial institutions worldwide. /blog/when-should-you-use-the-x9-pkiThu, 8 May 2025 12:42:43 UTCWhat Is ACME And Why Is It Important? | ¶ºÒõ¹ÝACME-compliant certificate-consuming devices, such as a web server or a network router, can automate certificate lifecycle management through any ACME-compliant certificate authority.?/blog/what-is-acme-and-why-is-it-importantThu, 8 May 2025 12:49:22 UTCHow the ClientAuth Crackdown Is Pushing Finance Toward X9 PKI | ¶ºÒõ¹ÝAs of June 15, 2026, public TLS server certificates must no longer include the Client Authentication EKU. It will carry significant consequences for financial services./blog/how-the-clientauth-crackdown-is-pushing-finance-toward-x9-pkiTue, 17 Jun 2025 13:05:53 UTCWattwatchers: A ¶ºÒõ¹Ý? ONE Success Story | ¶ºÒõ¹Ý Wattwatchers had the classic scale-up challenge: How do you grow from a lean startup serving consumers into a serious player in energy infrastructure?/blog/wattwatchers-a-digicert-one-success-storyFri, 30 May 2025 12:26:12 UTCA Q&A With the Women Driving Impact and Innovation | ¶ºÒõ¹ÝThese women are?unsung heroes in a complex, fast-moving space. They shape strategies, enable success, and create scalable impact./blog/q-and-a-with-women-driving-impact-and-innovationFri, 30 May 2025 19:39:37 UTCSimplify IoT Device Identity and Onboarding at Scale | ¶ºÒõ¹Ý¶ºÒõ¹Ý¡¯s new Cloud Platform Policy for Device Trust Manager enables zero-touch, identity-based onboarding to Azure Event Grid¡¯s MQTT broker./blog/simplifying-iot-device-identity-and-onboardingWed, 11 Jun 2025 19:51:30 UTCWhat the Updated Executive Order Really Means for Cybersecurity | ¶ºÒõ¹ÝThe latest Executive Order isn¡¯t a wholesale dismantling of cybersecurity progress but rather a reframing of priorities and an evolution of tone.?/blog/updated-executive-order-for-cybersecurityThu, 12 Jun 2025 16:59:48 UTCStrengthening Digital Trust with PKI+DNS | ¶ºÒõ¹ÝMany security teams are finding themselves stuck in a familiar pattern: managing separate systems for PKI and DNS, and a patchwork of tools/blog/strengthening-trust-with-pki-and-dnsThu, 19 Jun 2025 16:24:04 UTCMulti-Perspective Issuance Corroboration for Digital Certificates | ¶ºÒõ¹ÝMulti-Perspective Issuance Corroboration (MPIC) was designed to prevent unauthorized access by verifying domain control from multiple points on the internet, adding a crucial layer of defense./blog/mpic-for-digital-certificatesThu, 26 Jun 2025 13:21:13 UTCReady-to-Build Security: TrustCore SDK is Open Source | ¶ºÒõ¹ÝWe¡¯re open-sourcing TrustCore SDK (AGPL v3) to put that foundation in every developer¡¯s hands. No black box. No vendor waiting game. Just security you can trust/blog/trustcore-sdk-is-open-sourceFri, 5 Sep 2025 13:47:46 UTCDigital Trust At AI Speed | ¶ºÒõ¹ÝAI has the potential to make trust stronger than ever¡ªif you know how to use it. Imagine a system that not only validates what you build but proactively proves its integrity./blog/digital-trust-at-ai-speedFri, 5 Sep 2025 13:47:19 UTCHow to Secure Yesterday¡¯s Devices with Today¡¯s Solutions | ¶ºÒõ¹ÝThere¡¯s a quiet paradox at the heart of enterprise IoT: The most critical systems often rely on the oldest, least secure devices.?/blog/how-to-secure-yesterdays-devicesFri, 5 Sep 2025 13:47:46 UTC8 Best Practices for Certificate Linting | ¶ºÒõ¹ÝCertificate linting has become one of the most effective tools for catching issues before they lead to incident reports or revocations.?Here¡¯s some best practices./blog/best-practices-for-certificate-lintingThu, 24 Jul 2025 15:59:11 UTCUnlocking Embedded Security with ¶ºÒõ¹Ý TrustCore SDK | ¶ºÒõ¹ÝEmbedded systems power everything from connected insulin pumps to grid infrastructure. Yet the security foundations for these devices often lag behind evolving threats./blog/unlocking-embedded-security-with-digicert-trustcore-sdkWed, 30 Jul 2025 15:38:37 UTCWhy Embedded Security Needs to Be Open Source | ¶ºÒõ¹ÝWe¡¯re open-sourcing TrustCore SDK (AGPL v3) to put that foundation in every developer¡¯s hands. No black box. No vendor waiting game. Just security you can trust./blog/why-embedded-security-needs-to-be-open-sourceTue, 26 Aug 2025 18:59:20 UTCKey Insights from the Forrester TEI Study on ¶ºÒõ¹Ý ONE | ¶ºÒõ¹ÝDigital ecosystems are growing more complex, making public key infrastructure (PKI) management increasingly critical¡ªand increasingly costly./blog/key-insights-from-the-forrester-tei-studyFri, 5 Sep 2025 13:47:18 UTCGet Matter Certified: ¶ºÒõ¹Ý? + Beechwoods Embedded Experts | ¶ºÒõ¹ÝLaunching a Matter-certified device isn¡¯t just about strong security¡ªit¡¯s about getting to market before the competition, passing certification the first time./blog/get-matter-certified-with-digicert-and-beechwoodsMon, 25 Aug 2025 12:50:33 UTCHow UltraDDoS Protect Stands Up to Multi-Terabit DDoS Attacks | ¶ºÒõ¹ÝUltraDDoS Protect absorbed a steady barrage of high-volume distributed denial-of-service (DDoS) attacks, many peaking between 600 and 800 gigabits per second (Gbps).?/blog/how-ultraddos-protect-stands-up-to-multi-terabit-attacksFri, 5 Sep 2025 13:47:20 UTCCISA¡¯s SBOM Draft: Moving From Theory to Practice | ¶ºÒõ¹ÝOn August 22nd, the Cybersecurity and Infrastructure Security Agency (CISA) released its draft guide for Software Bill of Materials (SBOMs) for public comment./blog/cisa-sbom-draft-guideFri, 5 Sep 2025 13:47:22 UTCIndustry Timelines for Certificate Revocation | ¶ºÒõ¹ÝTiming is everything when a TLS certificate requires revocation. Industry rules define how long certificate authorities have to respond; the deadline is sometimes as little as 24 hours./blog/industry-timelines-for-certificate-revocationFri, 5 Sep 2025 13:47:10 UTCDo You Use Public TLS Certificates For mTLS? | ¶ºÒõ¹ÝAll CAs, even the free ones, will stop issuing Web PKI TLS certificates with client authentication. The ¶ºÒõ¹Ý X9 PKI may be the only answer./blog/do-you-use-public-tls-certificates-for-mtlsFri, 5 Sep 2025 13:47:34 UTCQuantum-Ready FN-DSA (FIPS 206) Nears Draft Approval from NIST | ¶ºÒõ¹ÝOne of the most anticipated developments? FN-DSA (FIPS 206), the FALCON-based digital signature scheme, has now been submitted to NIST for approval as a draft standard.?/blog/quantum-ready-fndsa-nears-draft-approval-from-nistFri, 5 Sep 2025 17:07:46 UTCWhy You Should Log OV SSL Certificates | ¶ºÒõ¹Ý.comRecent emails about Certificate Transparency raises the question of whether or not OV SSL Certificates should be registered in a CT log./blog/why-you-should-log-ov-ssl-certificatesFri, 12 Sep 2025 15:25:43 UTCCombating Fraud and Cyberscams this Tax Season | ¶ºÒõ¹Ý.comTax season means cyberscams a plenty, and it is critical to be vigilant, especially if you are planning to file your taxes online./blog/combatting-tax-season-cyberscamsFri, 12 Sep 2025 15:34:09 UTCGetting Ahead of Chrome 70 Distrust of Symantec-Issued Certificates | ¶ºÒõ¹Ý.comToday marks the planned release of Google Chrome 66 stable version and the culmination of the first major distrust event for Symantec root certificates in the world¡¯s most used web browser./blog/getting-ahead-chrome-70-distrust-symantec-issued-certificatesFri, 12 Sep 2025 16:00:33 UTCGovernments Rank Last in 2015 Software Security Report | ¶ºÒõ¹Ý.comA recent study conducted by Veracode reveals that government organization software applications are the most vulnerable and the least remedied./blog/governments-rank-last-2015-reportFri, 12 Sep 2025 16:10:50 UTCNCSAM Tip of the Week: Battle Social Engineering with Education | ¶ºÒõ¹Ý.comWeek 4 of National Cyber Security Awareness Month (NCSAM). The theme for this week is cybersecurity for small and medium-sized businesses./blog/ncsam-tip-week-battle-social-engineering-educationFri, 12 Sep 2025 16:13:12 UTCProactively Preventing Data Breaches | ¶ºÒõ¹Ý.comCompanies need to utilize the right tools and strategies to proactively prevent data breaches. Read our blog for tips./blog/proactively-preventing-data-breachesFri, 12 Sep 2025 17:52:35 UTCSay Goodbye to 2014, and Say Hello to a More Secure 2015 | ¶ºÒõ¹Ý.comOver 90% of data breaches in the first half of 2014 could have been prevented¡ªsuggesting that there is a lot of room for improvement in 2015./blog/say-goodbye-2014-say-hello-secure-2015Fri, 12 Sep 2025 17:54:11 UTCSecurity: A Critical Part of App Development | ¶ºÒõ¹Ý.comDevelopers must start making security an integral part of the development process, & stay atop best practices to keep their users¡¯ information safe./blog/security-critical-part-app-developmentFri, 12 Sep 2025 19:12:32 UTC