DigiCert Blog

  • Why CIOs and CSOs Should Work Together

    As today’s world becomes more dependent on technology, enterprises should feel the pressure to have the right people in the right positions—especially in the Chief Information Officer and Chief Security Officer roles. Both of these roles are evolving quickly. And it’s never been more important that these two people in…


  • The Consequences of Domain Hijacking

    Domain hijacking is exactly what it sounds like. A hacker hijacks a domain by fraudulently transferring ownership of the domain over to him or herself. For this to work a hijacker needs to know a few key pieces of information: the domain registrar name for the victim domain, and the…


  • The Security Benefits of Audit Logging

    As an IT administrator, knowing the precise sequence of activities that affect a specific operation, procedure, or event within a company is very valuable. This is where audit logging (sometimes called event logging or system logging) comes in. Logging creates an “audit trail”—a security-relevant chronological record, or set of records,…


  • This Month in SSL: May 2016

    Here is our latest news roundup of articles about network and SSL security. (Click here to see the whole series.) SSL & Encryption Microsoft announced they will deprecate SHA-1 within the next four months. OpenSSL released versions 1.0.2h and 1.0.1t, which fixed one high-severity flaw and four low-severity flaws. Google…


  • Why Enterprises Must Implement Mobile Security

    It is not unusual these days to see professionals using their own mobile devices for work-related tasks. However, the popular BYOD trend, despite its convenience, presents many security risks. IBM performed a study to “identify if and how mobile is transforming the enterprise and what companies are doing to secure…