Choosing The Right Certificate Lifecycle Management Solution For Your Organization

It’s no secret that in competitive situations vendors present comparison information to help influence buying decisions. This comparison information is often feature or functionality based with some FUD (fear, uncertainty and doubt) ...
Why You Must Go The SaaS And Automation Way To Step Up Your Cybersecurity Game

Why You Must Go The SaaS And Automation Way To Step Up Your Cybersecurity Game

Cybersecurity can be a game changer in realizing digital transformation success and driving better business outcomes. If you aren’t convinced about it yet, here are some findings from Accenture’s State of Cybersecurity ...
PKI: One Powerful Solution And Multiple Security Use Cases

PKI: One Powerful Solution And Multiple Security Use Cases

With cyberattacks continuing to escalate all around the world, it is no wonder that cybercrime has now entered the Top 10 rankings of the most severe global risks over the next decade, ...
4 Ways PKI Helps Secure IoT Devices

4 Ways PKI Helps Secure IoT Devices

From smart factories to retail, healthcare, automotive, utilities, and enterprise organizations, the Internet of Things (IoT) is everywhere. By capturing and providing valuable real-time insights, IoT is enabling better decision making and ...
digital, security, risk, zero-trust zero trust

Why Digital Trust is a Must (and how ‘Trust No One’ Makes it Happen)

Historically, trust was conveyed through in-person meetings; perhaps a handshake or someone delivering a handwritten note with a signature or seal. This provided a reliable message verified by someone trusted or a ...
Security Boulevard
Certificates and Pwnage and Patches, Oh My!

Certificates and Pwnage and Patches, Oh My!

| | Active Directory, PKI
This post was written by Will Schroeder and Lee Christensen.A lot has happened since we released the “Certified Pre-Owned” blog post and whitepaper in June of last year. While the paper details ...
Digital Identities and Assets - David Mahdi, Sectigo

Techstrong TV: Understanding & Managing Digital Identities

David and Charlene discuss how to effectively manage digital identities and assets in the rapidly evolving digital world. The video and a transcript of the conversation are below. This is Digital Anarchist ...
Security Boulevard
IoT Log4j Exchange ProxyLogon OT PKI IoT security

Rising Above Complexity to Secure IoT Devices

The internet of things (IoT) has truly come of age, and innovative new use cases are emerging all around us. Each day, we’re seeing the IoT in businesses and factories, cities, vehicles ...
Security Boulevard
A screenshot of an example warning message that displays on sites using expired SSL/TLS certificates. This is a demonstrative illustration for the benefits of PKI automation.

4 Takeaways from DigiCert’s 2021 PKI Automation Study

What are the top PKI challenges organizations are facing in 2021, and how are they tackling them? Data from DigiCert’s 2021 State of PKI Automation unveils several important trends. A... The post ...
A bar chart that shows the average total cost of a data breach (data credit: IBM's 2021 Cost of a Data Breach Report)

Growing Demand for Custom PKI Solutions Creates New Opportunities for IT Providers

Public key infrastructure (PKI) adoption is booming. New data from MarketsandMarkets forecasts that the global PKI market (which includes SSL/TLS certificates) will reach $9.8 billion by 2026 — let’s explore how you can get your piece of... The post ...

Secure Guardrails