According to a new Frost & Sullivan white paper, the number of consumers using digital payment methods continues to increase worldwide—and so do concerns about online fraud. With 6.17 million data records stolen every day by cybercriminals, companies doing business on the internet have two choices: win the digital trust of consumers or lose revenue. […]
The DigiCert Blog
This is the first of a series of technical blogs that DigiCert is publishing on quantum computing and the coming post-quantum transition. Upcoming articles will provide additional, easy to understand information about what is happening and steps that can be taken now to prepare for the future. Bookmark our blog and follow us on Twitter […]
Panasonic Connected Solutions Company builds IoT solutions that connect with people, devices and services. Chief Engineer Saburo Toyonaga and team develop security software for B-to-B IoT devices. They have developed an encryption module that permits incorporation of a certificate at manufacturing, and that runs efficiently even on CPUs with slower speeds or lower specifications. Panasonic […]
Many companies are unaware when there is no one receiving certificate renewal notices if the sole contact of a CA account leaves.
Data breaches caused by stolen devices are common and can deliver a huge financial blow to an organization.
We are often blinded by the “awe” factor of new technology. But before jumping in head first, take time to make sure the pros are worth the cons.
When it comes to IoT wearables, developers much think about security first.
There were 1,026 phishing and malware incidents reported in January 2016 alone, up 254 from 2015.
If the choice is ever between sending a document by email or through a secure account, always choose to submit it through a secure account. It’s safe and easy.
Myths about SSL protection and HTTPS encryption may elicit false misperceptions about proper enterprise security. Here are some of the most common myths debunked.
Here is our latest news roundup of articles about network and SSL security. (Click here to see the whole series.) SSL & Encryption Security researchers have discovered a flaw dubbed the DROWN vulnerability that allows an attack to decrypt traffic from secure servers supporting SSLv2, which is obsolete. Soon after researchers announced the vulnerability, OpenSSL […]
According to Gartner, public key infrastructure (PKI) will re-emerge as one of the most relevant mechanisms for organizations to address the IoT authentication problem.