According to a new Frost & Sullivan white paper, the number of consumers using digital payment methods continues to increase worldwide—and so do concerns about online fraud. With 6.17 million data records stolen every day by cybercriminals, companies doing business on the internet have two choices: win the digital trust of consumers or lose revenue. […]
The DigiCert Blog
This is the first of a series of technical blogs that DigiCert is publishing on quantum computing and the coming post-quantum transition. Upcoming articles will provide additional, easy to understand information about what is happening and steps that can be taken now to prepare for the future. Bookmark our blog and follow us on Twitter […]
Panasonic Connected Solutions Company builds IoT solutions that connect with people, devices and services. Chief Engineer Saburo Toyonaga and team develop security software for B-to-B IoT devices. They have developed an encryption module that permits incorporation of a certificate at manufacturing, and that runs efficiently even on CPUs with slower speeds or lower specifications. Panasonic […]
Enabling multi-factor authentication and using digital certificates is a best-practice approach to protecting consumer information.
Certificate Transparency provides a way for every certificate issued by any publicly trusted CA to be publicly logged, monitored, and audited.
Here is our latest news roundup of articles about network and SSL security. Click here to see the whole series. SSL & Encryption News Security researchers discovered an encryption flaw similar to the FREAK vulnerability. The flaw, dubbed Logjam, allows attackers to downgrade the 512-bit cryptography making a man-in-the-middle attack possible. Mozilla announced that upcoming versions […]
Security should be an integral part of the development process to ensure user data is protected.
A SHA-1 intermediate certificate in your SSL Certificate chain can cause trust errors to users who visit your website. The certificate is unnecessary and can be safely deleted.
A SHA-1 intermediate certificate can cause trust errors to users who have local copies of the certificate. The certificate is unnecessary and can be safely deleted.
The Logjam attack does not affect SSL Certificates, but admins should disable support for DHE_EXPORT ciphers and generate a unique 2048-bit Diffie-Hellman group. Users should update their browsers to the most recent version and then watch for updates.
In the past, the healthcare industry has focused on patient privacy. But security is not the same as privacy, and this leaves many records vulnerable to attack.
At DigiCert, we take pride in our customer relationships and our customers’ successes. Improving the customer experience is at the heart of every initiative. That’s why we are humbled whenever we receive recognition from outside parties. Just within the past month or so, we’ve added some additional hardware to the trophy case, and we’re in […]