Platform
Solutions
Buy
Company
Resources
Support
Back
Platform Overview
Trust Lifecycle Manager
Unified certificate automation and visibility.
CertCentral
Globally trusted certificates for websites and applications.
Private CA
Private trust for users, devices, and infrastructure.
DNS
Fast, resilient DNS to optimize security and availability.
Enterprise Trust
Software Trust Manager
Secure, policy-driven signing across your software supply chain.
Device Trust Manager
Identity, onboarding, and lifecycle management for devices and IoT.
Content Trust
Verified media and document integirty at enterprise scale.
Messaging Trust
Stop spoofing, secure messages, deliver verified logos in every inbox.
Integrations
AWS
F5
Google Cloud
HashiCorp
Cloudflare
See all integrations
Back
By Use Case
Prevent Outages With Automation
Automate discovery, renewal, and governance to eliminate certificate-related downtime.
Prepare For 47 Day TLS Certificates
Ensure automated certificate lifecycle management and full visibility.
Become Post Quantum Ready
Upgrade cryptographic agility and prepare systems for quantum-safe security.
Enable Zero Trust
Authenticate every user, device, and workload with strong identity and policy controls.
By Use Case
Modernize PKI
Replace legacy infrastructure with scalable, automated, cloud-ready PKI.
Leverage AI with Trusted Identity
Use AI-enhanced identity verification for users, applications, and digital interactions.
Maintain Compliance
Meet regulatory requirements with centralized auditability, policy enforcement, and reporting.
By Industry
Financial Services
Healthcare
Back
TLS/SSL Certificates
Single Domain
Multi Domain
Wildcard Domain
Signing Certificates
Code Signing
Document Signing Certificates
S/MIME Email Certificates
Mark Certificates
Trust Services
eIDAS/PKIo
DigiCert DNS
DigiCert Store
Back
Company
About DigiCert
Why DigiCert
Careers
Leadership
Professional Services
Contact Us
Corporate Resources
Blog
Events
Customer Stories
Newsroom
Webinars
YouTube Channel
Partners
Become a Partner
Channel Partner Directory
Technology Partner Directory
Cloud Partner Directory
Partner Portal
Back
Resource Center
Reports
Datasheets
White Papers
e-Books
Solution Briefs
Videos
Infographics
Additional Resources
Blog
Customer Stories
Events
FAQs
Demos
Webinars
DigiCert Labs
Quick Links
Support
CertCentral
Trust Calendar
Vercara DNS
DigiCert Labs
QuoVadis
Valimail
Back
Support
Support
PKI Support
Contact Us
Tools
Tools: S/MIME Certificate Linter
Tools: SSL Install Diagnostics
Tools: Certificate Utility for Windows
Tools: CSR Creator
Tools: Check CSR
Tools: SSL Certificate Installation Instructor
Resources
Documentation
API Documentation
Knowledgebase
Solutions
FAQs
What is PKI?
What is an SSL Certificate?
What is SSL, TLS & HTTPS?
How TLS/SSL Works
What's the Difference Between DV, OV & EV SSL Certificates?
Contact Support
Americas
Europe, Middle East Africa
Asia Pacific, Japan
Contact Us
×
RECOMMENDED LINKS
Compare Certificates
DigiCert® Trust Lifecycle Manager
DigiCert® Device Trust Manager
DigiCert® Software Trust Manager
DNS Solutions
Choose your language
English
German
Spanish
French
Italian
Dutch
Portuguese
Japanese
Korean
Traditional Chinese
Simplified Chinese
✕
Security 101
Security 101 is a basic overview of what you need to know about digital security.
Blog Home
Blog Topics
Newsroom
Email
Subscribe
HONEYPOTFIELDHTMLNAME
TLS Certificate Lifetimes Will Officially Reduce to 47 Days
5G Security
Android
Announcements
Artificial Intelligence
Authentication
Automation
Best Practices
Blockchain
Breaches
Browsers
CA/Browser Forum
CertCentral
Certificate Inspector
Certificate Lifecycle Management
Certificate Management
Certificate Pinning
Certificates
Cloud Security
Code Signing
Compliance
Crypto-Agility
Cryptography
Cybersecurity
Cybersecurity + Threat Prevention
DDoS
DMARC
DNS
DNS Trust Manager
Data Security
Device Trust
DigiCert DNS
DigiCert DNS Essentials
DigiCert Labs
DigiCert One
DigiCert PKI Platform
Digital Trust
Document Signing
Document Trust Manager
EV UI Changes
Elections
Electric vehicles
Email Security
Encryption
Enterprise Security
Events
Extended Validation
General
Guest Author
Health IT
Healthcare Security
Identity
Internet of Things
IoT Security
Machines
Malware
Migration
Mobile
Multi-Factor Authentication
National Cyber Security Awareness Month
Network Security
News
Open SSL
PKI
PQC (Post-Quantum Cryptography)
PSD2
Partner Blog
Partner Directory
Partner Program
Press Release
Privacy
Private CA
Product
QWACS
RSA
Root Certificates
S/MIME
SSL Certificate Management
Secure Remote Work
Security
Security 101
Smart Seal
Software Trust Manager
TLS/SSL
Trust Lifecycle Manager
Undefined
VMC
Vulnerabilities
WIFI Security
Zero Trust
Search All Results
83 Stories
Sort By
Most Recent
Author
Topics
article page url
Security 101
03-10-2023
Which SSL Certificate Do I Need? A Comprehensive Guide
article page url
Security 101
11-30-2022
Computer Security Day – Committing to Cyber Safety
article page url
Security 101
11-17-2022
Secure online shopping during the holidays
article page url
Security 101
02-10-2022
How to Secure Your Crypto Wallet Against Hacks: 10 Tips to Secure Cryptocurrency
article page url
Security 101
11-24-2021
Cybersecurity for Seniors – 7 Steps to Update Your Parents’ Security This Thanksgiving
article page url
Security 101
11-16-2021
DigiCert 2022 Security Predictions
article page url
Security 101
09-13-2021
DigiCert Culture
article page url
Security 101
08-23-2021
10 Tips to Avoid Phishing Scams
article page url
Security 101
05-06-2021
Code Signing Baseline Requirements to Require Larger Keys
article page url
Security 101
03-31-2021
How DigiCert Ensures the Integrity of Certificates: FAQs about DigiCert Compliance & Infrastructure
article page url
Security 101
03-11-2021
The Impact of Quantum Computing on Society
article page url
Security 101
10-07-2020
Why Elections are Not 100% Online — Yet
article page url
Security 101
08-21-2020
A Guide to Multi-Factor Authentication
article page url
Security 101
07-09-2020
Working with Delegated OCSP Responders and EKU Chaining
article page url
Security 101
05-06-2020
One-Year Public-Trust SSL Certificates: DigiCert's Here to Help
article page url
Security 101
10-04-2018
NIST’s “Mitigating IoT-Based Distributed Denial of Service” Study
article page url
Security 101
03-29-2018
21 Online Scams You May Not Know About [Infographic]
article page url
Security 101
09-28-2017
Safari 11 Introduces Improved UI for Certificate Warnings
article page url
Security 101
08-14-2017
4 Recommendations for Integrating Security in DevOps
article page url
Security 101
08-24-2016
Sweet32 Birthday Attack: What You Need to Know
article page url
Security 101
08-03-2016
Key Elements of a Disaster Recovery Plan
article page url
Security 101
07-22-2016
What the Internet of Things Means for Your Car
article page url
Security 101
06-06-2016
The Consequences of Domain Hijacking
article page url
Security 101
06-02-2016
The Security Benefits of Audit Logging
article page url
Security 101
05-18-2016
Employees Still the Biggest Threat to Enterprise Security
article page url
Security 101
05-16-2016
Chrome Connection Tab Changes to Security Panel
article page url
Security 101
04-20-2016
Benefits of an Email Distribution List
article page url
Security 101
04-07-2016
Security Concerns in IoT Wearables
article page url
Security 101
03-30-2016
Uploading Documents Is Safer than Email
article page url
Security 101
03-28-2016
Debunking SSL and HTTPS Security Myths
article page url
Security 101
03-14-2016
SLOTH Attacks and the Risks Involved
article page url
Security 101
12-11-2015
Dangers of Connecting to Public Wi-Fi
article page url
Security 101
12-03-2015
A Look at Google's Accelerated Mobile Pages
article page url
Security 101
11-16-2015
Why Home Network Security Is Important
article page url
Security 101
11-09-2015
EMV Cards: What’s the Chip and Who’s Liable Now?
article page url
Security 101
10-21-2015
Creating a Secure BYOD Enterprise
article page url
Security 101
10-12-2015
Implementing Security in the Internet of Things
article page url
Security 101
10-02-2015
How to Remove an Expired Intermediate from the SSL Certificate Chain
article page url
Security 101
08-21-2015
Dangers of Visual Hacking
article page url
Security 101
08-14-2015
Benefits of Public Key Pinning
article page url
Security 101
08-12-2015
DEF CON 23 Recap
article page url
Security 101
08-04-2015
IoT: Prioritizing Security in Smart Clothing
article page url
Security 101
07-10-2015
Replace Your Certificates for Internal Names
article page url
Security 101
06-03-2015
Certificate Transparency: FAQs
article page url
Security 101
05-22-2015
How to Fix “Site Is Using Outdated Security Settings” on Browser
article page url
Security 101
05-22-2015
How to Fix “Site Is Using Outdated Security Settings” on Server
article page url
Security 101
04-17-2015
Hackers: The Internet's Immune System
article page url
Security 101
04-01-2015
Understanding OCSP Times and What They Mean for You
article page url
Security 101
03-25-2015
The Current State of .Onion Certificates and What Happens Next
article page url
Security 101
03-16-2015
IoT Security: When Fiction Becomes Reality – Part II
article page url
Security 101
03-05-2015
FREAK Attack: What You Need to Know
article page url
Security 101
03-03-2015
IoT Security: When Fiction Becomes Reality - Part I
article page url
Security 101
02-25-2015
Superfish-like Behavior Found Again with Komodia and PrivDog
article page url
Security 101
02-20-2015
Lenovo’s Superfish Adware and the Perils of Self-Signed Certificates
article page url
Security 101
02-02-2015
The Evolution of SSL and TLS
article page url
Security 101
01-17-2015
The New Reality of Information Security
article page url
Security 101
01-06-2015
How Website Seals Affect User Trust
article page url
Security 101
12-04-2014
Your Children Could Open You to Attack
article page url
Security 101
11-26-2014
Should I Buy from This Site? How to Know if a Website is Secure
article page url
Security 101
11-03-2014
The Value of Authentication
article page url
Security 101
10-28-2014
WiFi Network Attacks 101
article page url
Security 101
10-25-2014
This Week in SSL – Zero Day Windows Exploit, Chinese Hack iCloud, and Details on the JPMorgan Hack
article page url
Security 101
10-15-2014
This POODLE Bites: New Vulnerability Found on Servers
article page url
Security 101
09-30-2014
Intro to Penetration Testing Part 3: It Could Happen to You
article page url
Security 101
09-26-2014
This Week in SSL – Shell Shock, Smartphone Encryption, and Google’s SSL Push
article page url
Security 101
09-17-2014
Android Browser Bug Allows Same Origin Policy Bypass
article page url
Security 101
09-03-2014
MS SmartScreen and Application Reputation
article page url
Security 101
09-02-2014
The Internet of Things: Security Issues that Need Resolutions
article page url
Security 101
08-27-2014
Always-On SSL Means New Life for Privacy and Security Online
article page url
Security 101
08-27-2014
Don't Get Caught by Phishing Scams
article page url
Security 101
08-12-2014
Easy Quick Start Guide to Build Strong WiFi Security
article page url
Security 101
07-26-2014
Thwarting the Man-in-the-Middle
article page url
Security 101
07-16-2014
Creating Strong Password Policy Best Practices
article page url
Security 101
05-10-2014
3 Quick Facts on Why a Strong Password Policy Matters
article page url
Security 101
05-01-2014
In Online Security, Who Can You Trust?
article page url
Security 101
04-27-2014
SSL Certificates Trusted by Every Major Browser
article page url
Security 101
04-07-2014
What is Heartbleed? And What You Can Do About It
article page url
Security 101
03-18-2014
Automating Certificate Management: How SSL APIs Work
article page url
Security 101
02-21-2014
How the Green Bar in Extended Validation SSL Was Born
article page url
Security 101
01-30-2014
Kill the Fax Machine, Enable Secure Information Exchange
article page url
Security 101
01-18-2014
The Benefits of Managed PKI Services for SSL Certificates
article page url
Security 101
12-07-2013
Important SHA-2 SSL Certificate Questions & Answers
article page url
Security 101
08-10-2013
Is Data in the Cloud Data at Risk?
Load More
TO TOP