A Security Solution that Learns Along with IoT Development

The Internet of Things (IoT) has not yet reached maturity, but with all its possibilities, users and manufacturers have enthusiastically acquired and invested in it without properly considering security. We’re still figuring out a lot about the IoT: what we want from it, what level of privacy we are comfortable with, where the legal limits […]

Five Tips for Secure Remote Email Access

Best practices to help your organization send and receive secure messages How many emails do you receive every day? How do you know the emails you are sending and receiving are secure? How do you know that your employees’ emails are secure, especially when they are working remotely and sending emails from home or unknown […]

How to Avoid Cyberattacks While Working from Home

Hackers will take advantage of any vulnerability they can find. Amidst the pandemic of COVID-19, attackers are taking advantage of the alertness of the world population with phishing emails, social media posts, apps and text messages containing malware. These scams typically involve fraudsters impersonating healthcare officials. According to Check Point Threat Intelligence, “since January 2020, […]

Nine Tips to Securely Work from Home

Even before the coronavirus outbreak, employees were increasingly working from home. According to the Federal Reserve, the percentage of the labor force working from home tripled in the last 15 years. However, since the World Health Organization declared COVID-19 a pandemic, many companies are asking their employees to work from home. As more people log […]

Infographic: One Million Good Reasons To Invest In Modern PKI

Organizations can save nearly $1 million annually by adopting a cloud-based, fully managed PKI service, according to an IDC study. You probably already know the benefits of adopting modern PKI. Simplicity. Flexibility. Versatility. Managed PKI is increasingly being adopted by companies around the globe for these reasons. Not only does PKI solve a number of […]

DigiCert Labs to Explore Categorizing IoT Devices Based on Security, Privacy Using AI and Pattern Recognition Technologies

Today, we are surrounded by devices that can record the surrounding sound without our consent, take pictures without our knowledge and transmit data without our permission. In other words, we are surrounded by digital eyes and ears. Commonly, we categorize these devices as the Internet of Things, or IoT for short. Examples such as Amazon […]