DigiCert Blog

All posts under: Data Security

  1. DDoS Trends & Predictions for 2016

    In a recent study, Akamai reported that DDoS attacks are continuing to increase in frequency and duration. This isn’t surprising since a Neustar survey of security professionals showed that DDoS attacks targeted half of U.S.-based companies in 2014 and 2015. DDoS attacks are a growing problem because attackers develop different strategies for attacks and the…


  2. Dangers of Connecting to Public Wi-Fi

    In today’s world, free public Wi-Fi is commonplace, available in places varying from restaurants to beaches to subway stations. Passwords are frequently unnecessary—merely connect your smart device and use away. Unfortunately, while public Wi-Fi provides convenience and free browsing without dipping into data, it also gives cybercriminals easy access to personal files and information. The…


  3. Cyber Insurance: The Next Big Thing?

    While there is obviously no cause to celebrate the devastation of the past years’ big cyber hacks, the consequences of these hacks have undeniably led to more urgent infosec development and practices. As Robert Parisi of the network insurance broker Marsh USA puts it, “The number of (data) breaches in 2013 certainly was the last…


  4. EMV Cards: What’s the Chip and Who’s Liable Now?

    According to research done by Barclays in 2015, the US is responsible for 47% of global credit card fraud, while only accounting for 24% of card volume. This staggering statistic, along with massive commercial hacks affecting millions of Americans over the past few years, is reason enough to suggest that credit security is demanding new…


  5. Securing Enterprise Keys and Certificates Should Be a Priority

    In March 2015, Ponemon Institute published a report that analyzed business failures associated with a lack of trust in the security of a company’s keys and certificates. The report states that of 2,300 participants from enterprises around the world, 54% admit to having a lack of policy enforcement and remediation for keys and certificates. Likewise,…