The DigiCert Blog

The Latest

Making the Most of Vulnerability Scanners

While it’s definitely no easy task, regular vulnerability checks are an essential component of any healthy network. The narrow amount of time it takes for hackers to find and exploit vulnerabilities makes these checks crucial in data protection....

Key Takeaways from FDA Guidance on Medical Device Cybersecurity

The FDA recently issued a draft guidance—a follow-up of the 2013 cybersecurity safety communication stressing premarket cyberattack preparation—that outlines the important steps medical device manufacturers should take to continually address...

STRIPTLS Attacks and Email Security

Major email providers such as Google, Yahoo, and Outlook encrypt and authenticate their emails. However, not all businesses are quick to follow these best practices. Many email organizations use SMTP (Simple Mail Transfer Protocol) the Internet...

View More