DigiCert Blog

  • What to Expect from the RSA Security Conference

    In less than a week, the RSA Conference will celebrate its 25th anniversary, gathering more than 30,000 attendees in San Francisco’s Moscone Center for annual favorites such as the Cryptographers’ Panel, big name keynotes, hacking demos, and lively after-hour parties. RSA will feature over 400 expert-led sessions and 500 exhibitors,…


  • Safety in a Good Password

    Max Nisen with Business Insider has pointed out that frankly, our society has become “Internet obsessed.” The Internet has become a necessary resource in the workplace and in education. People who use the Internet just for leisure can log up to 100 minutes a day, and that rapidly growing number…


  • Making the Most of Vulnerability Scanners

    While it’s definitely no easy task, regular vulnerability checks are an essential component of any healthy network. The narrow amount of time it takes for hackers to find and exploit vulnerabilities makes these checks crucial in data protection. Likewise, the ever-changing climate of Internet security demands that admins frequently check…


  • Key Takeaways from FDA Guidance on Medical Device Cybersecurity

    The FDA recently issued a draft guidance—a follow-up of the 2013 cybersecurity safety communication stressing premarket cyberattack preparation—that outlines the important steps medical device manufacturers should take to continually address cybersecurity risks in order to keep patients safe and better protect the public health. The risk inherent in networked medical…


  • STRIPTLS Attacks and Email Security

    Major email providers such as Google, Yahoo, and Outlook encrypt and authenticate their emails. However, not all businesses are quick to follow these best practices. Many email organizations use SMTP (Simple Mail Transfer Protocol) the Internet standard for email transmission. Unfortunately, SMTP was not built with encryption or authentication in…