According to a new Frost & Sullivan white paper, the number of consumers using digital payment methods continues to increase worldwide—and so do concerns about online fraud. With 6.17 million data records stolen every day by cybercriminals, companies doing business on the internet have two choices: win the digital trust of consumers or lose revenue. […]
The DigiCert Blog
This is the first of a series of technical blogs that DigiCert is publishing on quantum computing and the coming post-quantum transition. Upcoming articles will provide additional, easy to understand information about what is happening and steps that can be taken now to prepare for the future. Bookmark our blog and follow us on Twitter […]
Panasonic Connected Solutions Company builds IoT solutions that connect with people, devices and services. Chief Engineer Saburo Toyonaga and team develop security software for B-to-B IoT devices. They have developed an encryption module that permits incorporation of a certificate at manufacturing, and that runs efficiently even on CPUs with slower speeds or lower specifications. Panasonic […]
This year 51% of online shopping will be done on a mobile device but most mobile devices do not have the security to block common cyber threats.
Only a quarter of people tread carefully when they connect to public Wi-Fi.
An increase in computing power suggests that 1024-bit encryption is no longer secure enough to protect company private keys.
No SSL Certificate management-related actions are needed at this time, but admins should patch OpenSSL framework as soon as possible.
The benefits of Google’s new project AMP are obvious, but the concerns warrant careful attention as well.
CertCentral consolidates certificate management for administrators and decreases risks associated with manual management.
Here is our latest news roundup of articles about network and SSL security. (Click here to see the whole series.) SSL & Encryption News Microsoft is reconsidering when they will deprecate support for SHA-1 Certificates due to research about increasing risks associated with using this hash. This blog post discusses deprecating the algorithm as early […]
Big hacks over the past couple years have led many organizations to purchase cyber insurance as a means to protect their data. Is cyber insurance adequately prepared to meet the growing demands of Internet risks?
“This is not a long-term solution as connections are only as secure as the weaker of the two configurations.”