DigiCert Blog

All posts under: Privacy

  1. Black Hat Recap: What InfoSec Must Do for Data Security

    Black Hat Conference Recap

    At Black Hat 2014, conference founder Jeff Moss reminded the audience that staying safe today requires us to simplify our approach to information security. With the changes we’ve seen in digital information gathering and the number of security lapses that continue to grow, it’s no longer enough to just focus on the big picture. Staying safe…


  2. Forward Secrecy Secures Past Data from Future Compromises

    Secure SSL Key with Forward Secrecy

    On top of the foundation of encryption from SSL and HTTPS, Twitter made headlines when it enabled Forward Secrecy as a way to enhance its efforts to secure online systems and protect user communication online. Forward Secrecy is a powerful security option that ensures communication that was previously secured online remains safe, even if the…


  3. In Online Security, Who Can You Trust?

    Managed PKI SSL Services

    The Online Trust Alliance performs a yearly audit of top consumer sites and how they handle customer data, security, and privacy, in the most recent online trust security audit, only 30% of sites tested passed a basic security audit. At DigiCert we take the OTA’s work very seriously, and we are members of the highest…


  4. What is Heartbleed? And What You Can Do About It

    On April 7, 2014, a bug in the OpenSSL software library was announced by the OpenSSL organization. This bug, called Heartbleed, impacts versions 1.0.1 through 1.0.1f of OpenSSL. Heartbleed is not an SSL bug or flaw with the SSL/TLS protocol — it’s a bug in OpenSSL’s implementation of SSL/TLS which servers rely on to create secured connections…


  5. 5 Tips For Safe Cyber Shopping This Holiday

    The holiday season is a wonderful time for so many reasons. Families get together, total strangers reach out to help those in need, and generosity and the spirit of giving is felt far and wide. But sadly,  it’s also prime time for cyber criminals to steal your data. With that in mind here are five…