Understanding the Role of Extended Validation Certificates in Internet Abuse White Papers

Understanding the Role of Extended Validation Certificates in Internet Abuse

Original research from Georgia Tech's Cyber Forensics Innovation Lab shows that domains with EV SSL certificates are 99.99% likely to be free of online abuse. Download the report here.
HackerGuardian - Sectigo PCI Compliance Technical Documents & Guides

HackerGuardian - Sectigo PCI Compliance

Generates two PCI network reports that are similar but intended for different purposes: One designed to offer proof of compliance, and the other to serve as a remediation guide.
AutoApplyOrder API Technical Documents & Guides

AutoApplyOrder API

Our new, single API – AutoApplyOrder – makes requesting not only our range of SSL certificates, but also new products such as CodeGuard, HackerGuardian PCI Compliance, VPN and easier than ever.
Root Causes 1-53: 2019 Lookback - Governments Try to Control PKI copy Podcast

Root Causes 1-53: 2019 Lookback - Governments Try to Control PKI copy

California Senate Bill 327 (SB-327) goes into effect January 1, 2020. This groundbreaking ordinance requires basic security measures for devices deployed in California.
Root Causes 1-53: 2019 Lookback - Governments Try to Control PKI copy Podcast

Root Causes 1-53: 2019 Lookback - Governments Try to Control PKI copy

New research out of Indiana University Bloomington reviews nearly 400 "incidents" with public SSL certificates over the course of more than a decade. Join us as we go through the main findings from this piece of original research.
Root Causes 1-53: 2019 Lookback - Governments Try to Control PKI copy Podcast

Root Causes 1-53: 2019 Lookback - Governments Try to Control PKI copy

2019 saw the emergence of wholesale attacks on the world's energy infrastructure, an epidemic of ransomware incidents against municipalities, and a number of legislative measures to try to secure this whole set of systems and devices.
Root Causes 1-51: Blockchain vs PKI copy Podcast

Root Causes 1-51: Blockchain vs PKI copy

2019 has been an eventful year for PKI. In this episode, first in a series of four lookbacks at the year, our hosts discuss how governments sought to control encryption, certificates, and public trust in 2019.
Root Causes 1-50: Energy Infrastructure Cyber Attacks copy Podcast

Root Causes 1-50: Energy Infrastructure Cyber Attacks copy

In our industry interactions we frequently run into questions about how PKI and blockchain compare with each other. How do they work similarly or differently? Are they surrogates for each other? Are they complimentary?
Root Causes 1-49: California Consumer Privacy Act copy Podcast

Root Causes 1-49: California Consumer Privacy Act copy

Global energy infrastructure continues to find itself under cyber attack from Advanced Persistent Threats (APTs). Join our hosts as we discuss recent attacks on power plants, why these attacks persist, and possible responses.
Root Causes 1-47: Quantum Apocalypse - Quantum Resistant Cryptography for IoT copy copy Podcast

Root Causes 1-47: Quantum Apocalypse - Quantum Resistant Cryptography for IoT copy copy

The California Consumer Privacy Act (CCPA) has been described by some as California's GDPR. This act provides broad protections to consumers in California, and businesses must comply starting January 1, 2020.

Chat With Us

We are here for you!
Talk to a fellow human.


United States

+1-888-266-6361

International

+1-703-581-6361