According to a new Frost & Sullivan white paper, the number of consumers using digital payment methods continues to increase worldwide—and so do concerns about online fraud. With 6.17 million data records stolen every day by cybercriminals, companies doing business on the internet have two choices: win the digital trust of consumers or lose revenue. […]
The DigiCert Blog
This is the first of a series of technical blogs that DigiCert is publishing on quantum computing and the coming post-quantum transition. Upcoming articles will provide additional, easy to understand information about what is happening and steps that can be taken now to prepare for the future. Bookmark our blog and follow us on Twitter […]
Panasonic Connected Solutions Company builds IoT solutions that connect with people, devices and services. Chief Engineer Saburo Toyonaga and team develop security software for B-to-B IoT devices. They have developed an encryption module that permits incorporation of a certificate at manufacturing, and that runs efficiently even on CPUs with slower speeds or lower specifications. Panasonic […]
With DigiCert encryption security and authentication, researchers can collaborate on high performance computing systems to improve our way of life.
We need a fundamental shift in our mindset of data security. Leveraging technology and better policies, we can improve online data security.
73% of users have the same password for multiple sites, 33% use the same password every time creating an easy target for breaches and identity theft.
Using the free Certificate Inspector, administrators can quickly identify all SSL Certificates on a network and simplify certificate lifecycle management.
High Assurance SSL Certificates are trusted by all browsers so users always see https:// and the secure lock when they access a secure site.
There are several online Heartbleed detection tools that rely solely on checking the NotBefore Data. There are major flaws with this approach to Heartbleed vulnerability that administrators should consider.
A bug in the software servers use to create secure connections leaves sites open to exploits allowing attackers to obtain sensitive data from secured Web sites.
APIs combined with cloud-based certificate management and deployment services make certificate lifecycle management in the enterprise network easy.
Unattended systems are a hackers best friend. Strong security requires balancing human verification and smart technology in order to prevent exploits from hackers and scammers.