Today, we are excited to announce our agreement to acquire Symantec’s Website Security business. The deal is expected to close before the end of the year, pending formal reviews. We will continue to operate from our Lehi, Utah headquarters with support from Symantec’s Mountain View and other global offices. With this deal, we are bringing […]
The market is at a tipping point with almost half of enterprises currently integrating security into DevOps initiatives.
This new partnership will accelerate development, increase the speed of innovation, and ensure continuous delivery of certificates for DevOps environments.
We expect the new CAA requirement to have a small impact on the security and complexity of the web, but we are happy it is an improvement with a low-cost process.
This vulnerability does not affect SSL/TLS certificates nor does it affect versions prior to OpenSSL 1.1.0.
The new User role gives you a better way to manage your team’s access to the correct certificates.
These vulnerabilities do not affect SSL/TLS certificates, but system admins should patch their 1.1.0 OpenSSL framework as soon as possible.
The policy change goes into effect October 2017. Learn what this means for DigiCert customers.
The “critical” vulnerability introduced in OpenSSL 1.1.0a does not affect SSL/TLS Certificates but admins should still patch their OpenSSL framework as soon as possible.