DigiCert Blog

All posts under: Authentication

  1. Biometric Authentication: An Added Layer of Security or Security Risk?

    Do you remember the first time you were awed by the biometric authentication used to verify someone’s identity in a movie? Perhaps you watched a character use voice recognition to board a Pan Am space plane in 2001: A Space Odyssey; perhaps you watched Tiffany Case use a fingerprint scanner to authenticate her guests in…


  2. PKI: Solving the IoT Authentication Problem

    Big data and connectivity are changing the way we live and do business. Connecting every day devices, products, and systems to the global Internet provides the ability to have rich data at our fingertips to improve our decision-making, analyze patterns, and, for businesses, improve the bottom line. This movement toward connecting everything to the Internet…


  3. STRIPTLS Attacks and Email Security

    Major email providers such as Google, Yahoo, and Outlook encrypt and authenticate their emails. However, not all businesses are quick to follow these best practices. Many email organizations use SMTP (Simple Mail Transfer Protocol) the Internet standard for email transmission. Unfortunately, SMTP was not built with encryption or authentication in mind and SMTP email security…


  4. Ordering a .Onion Certificate from DigiCert

    We recently fielded a high volume of questions about how to obtain a SSL Certificate for a .onion address. This blog post should provide basic answers to queries regarding .onion certificates. Background As of September, .onion is recognized as a special-use domain by the IESG, which means they can be secured with SSL Certificates. (Previously…


  5. How Effective Authentication Protects You Online

    Every security expert knows that there are two parts to successful security: encryption and authentication. While the responsibility for effective encryption lives predominantly in the hands of the experts, the responsibility for effective authentication really lies in the hands of every Internet user. Although there is a continual debate over best security practices, there are…