DigiCert Blog

All posts under: Best Practices

  1. Clearing Up Confusion about Certificate Transparency Requirements

    Some SSL Certificate customers have received emails from other Certificate Authorities (CA) that say they must enable Certificate Transparency (CT) for all their SSL Certificates. These emails urge customers to enable CT for “all” their SSL Certificates by June 1, 2016 otherwise their site(s) may be deemed “untrusted” in Google’s Chrome browser. This has caused…


  2. Two Ways the Healthcare Industry Can Combat Breaches

    Have you seen the jaw-dropping statistics from the Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data? The independent study commissioned by the Ponemon Institute is confirming what many security professionals have predicted and feared: the majority of healthcare entities in the study have experienced multiple data breaches, and the breached organizations lack…


  3. Employees Still the Biggest Threat to Enterprise Security

    Time and time again it has been found that the greatest vulnerabilities in enterprise security rests in the hands of business’ employees. In fact, one recent study in the U.K. found that 75% of large organizations suffered staff-related security breaches in 2015, with 50% of the worst breaches caused by human error. So as employees…


  4. Tips For Digital Spring Cleaning

    April showers bring May flowers, and also remind us that it’s time for spring cleaning. So as we start cleaning out our basements and filtering through our unnecessary belongings with this change of seasons, it’s important not to skip over our digital junk rooms both at home and at work. Digital spring cleaning is essential,…


  5. OpenSSL Patches Five Security Vulnerabilities

    Earlier this morning, the OpenSSL project team released two security patches—1.0.2h and 1.0.1t—for five security vulnerabilities discovered in OpenSSL. These two new patches fix one “high” severity and four “low” severity vulnerabilities. None of these bugs affect SSL Certificates. No actions related to SSL Certificate management are required. High Severity Vulnerabilities Memory corruption in the…