DigiCert Blog

All posts under: Security

  1. Researchers Urge Administrators to Replace SHA-1 Certificates with SHA-2

    Online Security Warning

    This morning an international team of cryptanalysts urged administrators to replace their SHA-1 certificates as the risks associated SHA-1 are greater than previously expected. The published findings are theoretical and have not yet been proven in a practical setting. While there doesn’t appear to be an immediate present danger, we strongly encourage administrators to migrate…


  2. Healthcare Security Battlefront: Data Breaches and Building Security

    This year celebrates the 10th anniversary of National Health IT week. Health IT serves to improve the quality of healthcare delivery, decrease medical errors, improve patient safety, and improve patient outcomes. The industry has seen massive advances in networked medical devices and electronic health records over the past few years. Unfortunately, as noted by a…


  3. Enterprise Security: The Advantages of Using EV Certificates

    As more and more people choose to shop, share, bank, and view accounts online, the need for online browsing security has also grown. SSL Certificates are critical to online security and are the backbone of Internet safety. Extended Validation (EV) Certificates, in particular, provide that extra layer of protection be requiring a strictly defined issuance…


  4. Closing the Security Gap between Experts and Regular Users

    The continual news of security hacks over the past couple years has made information security a hot topic even outside of the infosec industry. Internet users who may have previously had weak or obvious passwords have now become conscious of their responsibility to use strong passwords—whether or not they are prompted by a website to…


  5. How Effective Authentication Protects You Online

    Every security expert knows that there are two parts to successful security: encryption and authentication. While the responsibility for effective encryption lives predominantly in the hands of the experts, the responsibility for effective authentication really lies in the hands of every Internet user. Although there is a continual debate over best security practices, there are…