DigiCert Blog

  • The Consequences of Domain Hijacking

    Domain hijacking is exactly what it sounds like. A hacker hijacks a domain by fraudulently transferring ownership of the domain over to him or herself. For this to work a hijacker needs to know a few key pieces of information: the domain registrar name for the victim domain, and the…


  • The Security Benefits of Audit Logging

    As an IT administrator, knowing the precise sequence of activities that affect a specific operation, procedure, or event within a company is very valuable. This is where audit logging (sometimes called event logging or system logging) comes in. Logging creates an “audit trail”—a security-relevant chronological record, or set of records,…


  • This Month in SSL: May 2016

    Here is our latest news roundup of articles about network and SSL security. (Click here to see the whole series.) SSL & Encryption Microsoft announced they will deprecate SHA-1 within the next four months. OpenSSL released versions 1.0.2h and 1.0.1t, which fixed one high-severity flaw and four low-severity flaws. Google…


  • Why Enterprises Must Implement Mobile Security

    It is not unusual these days to see professionals using their own mobile devices for work-related tasks. However, the popular BYOD trend, despite its convenience, presents many security risks. IBM performed a study to “identify if and how mobile is transforming the enterprise and what companies are doing to secure…