DigiCert Blog

  • Making the Most of Vulnerability Scanners

    While it’s definitely no easy task, regular vulnerability checks are an essential component of any healthy network. The narrow amount of time it takes for hackers to find and exploit vulnerabilities makes these checks crucial in data protection. Likewise, the ever-changing climate of Internet security demands that admins frequently check…


  • Key Takeaways from FDA Guidance on Medical Device Cybersecurity

    The FDA recently issued a draft guidance—a follow-up of the 2013 cybersecurity safety communication stressing premarket cyberattack preparation—that outlines the important steps medical device manufacturers should take to continually address cybersecurity risks in order to keep patients safe and better protect the public health. The risk inherent in networked medical…


  • STRIPTLS Attacks and Email Security

    Major email providers such as Google, Yahoo, and Outlook encrypt and authenticate their emails. However, not all businesses are quick to follow these best practices. Many email organizations use SMTP (Simple Mail Transfer Protocol) the Internet standard for email transmission. Unfortunately, SMTP was not built with encryption or authentication in…


  • How Short-Lived Certificates Improve Certificate Trust

    Certificate Revocation Lists (CRLs) and Online Certificate Status Protocol (OCSP) are important technologies that—with ongoing work to improve their operations—can continue to provide a foundation for online trust. However, recent efforts within the CA/Browser Forum and Mozilla’s decision to support “short-lived” certificates in future versions of Firefox have shined the…