DigiCert Blog

  • Three Challenges for the Industrial IoT

    Enterprise SSL Inventory Management

    The Industrial Internet of Things (IIoT) is a sublet of the IoT phenomenon, referring specifically to connected technologies in the manufacturing industry. IIoT technology captures data by monitoring and controlling production processes, which improves overall documentation and quality management. By 2020, revenues generated from the IIoT market will be about…


  • Higher Education: Subpar Grades for Cybersecurity

    Cyber criminals are targeting educational institutions, especially colleges and universities. Thus far, 2016 alone has seen a reported 53 educational breaches, exposing as many as 366,196 records of students and staff. These stats are frightening, as they contend with 2015’s yearly total of 63 breaches in only six months. One…


  • Why CIOs and CSOs Should Work Together

    As today’s world becomes more dependent on technology, enterprises should feel the pressure to have the right people in the right positions—especially in the Chief Information Officer and Chief Security Officer roles. Both of these roles are evolving quickly. And it’s never been more important that these two people in…


  • The Consequences of Domain Hijacking

    Domain hijacking is exactly what it sounds like. A hacker hijacks a domain by fraudulently transferring ownership of the domain over to him or herself. For this to work a hijacker needs to know a few key pieces of information: the domain registrar name for the victim domain, and the…


  • The Security Benefits of Audit Logging

    As an IT administrator, knowing the precise sequence of activities that affect a specific operation, procedure, or event within a company is very valuable. This is where audit logging (sometimes called event logging or system logging) comes in. Logging creates an “audit trail”—a security-relevant chronological record, or set of records,…