According to a new Frost & Sullivan white paper, the number of consumers using digital payment methods continues to increase worldwide—and so do concerns about online fraud. With 6.17 million data records stolen every day by cybercriminals, companies doing business on the internet have two choices: win the digital trust of consumers or lose revenue. […]
The DigiCert Blog
This is the first of a series of technical blogs that DigiCert is publishing on quantum computing and the coming post-quantum transition. Upcoming articles will provide additional, easy to understand information about what is happening and steps that can be taken now to prepare for the future. Bookmark our blog and follow us on Twitter […]
Panasonic Connected Solutions Company builds IoT solutions that connect with people, devices and services. Chief Engineer Saburo Toyonaga and team develop security software for B-to-B IoT devices. They have developed an encryption module that permits incorporation of a certificate at manufacturing, and that runs efficiently even on CPUs with slower speeds or lower specifications. Panasonic […]
Employees are the first line of defense in enterprise security, but bad habits make them an easy target for cybercriminals to access sensitive information.
Google's Chrome Connection Tab, security icons, and information were confusing for users and too basic for developers; now it is the Chrome Security Panel.
The cloud is essentially a borderless environment leaving many companies vulnerable to attack.
The Internet of Things is wide open to attack; security must become a priority or the connected world will crash.
Spring cleaning is not only limited to the dust in our basements and the lint in our closets, but also the needless items in our digital junk rooms.
The vulnerabilities identified in OpenSSL do not affect SSL Certificates; system admins should patch their OpenSSL framework as soon as possible
Here is our latest news roundup of articles about network and SSL security. (Click here to see the whole series.) SSL & Encryption Google recently released a list of Certificate Authorities that are not trusted by browsers. Data Breaches A cybercriminal attempted to sell sensitive information for 1.5 million Verizon customers on the black market […]
Malicious ads can reach a thousands of users in a short time. Even when malicious ads are taken down within 24 to 48 hours after they’re discovered, they can infect up to hundreds of thousands of users.
Cyber warnings have been issued and news has been reported, but Ransomware is still a thriving business. Prevention may just be the greatest key to safety.