Threats

Covering all angles

Security Articles

How Secure Are You?

GET CHECKLIST

81 Million
XXX Major Threats Averted Q1 2017

Types of Malware, as of April 2017

The Uncommon Denominator

Trusted online. In the air. And everywhere else. DigiCert is the uncommon denominator in SSL, IoT and PKI solutions.

LEARN MORE

ENCRYPTION IS COMMON. MAKING IT EASY ISN'T.

The uncommon denominator

Data Accidentally Exposed

Data Accidentally Exposed

Users of online dating site, Soulmates, got sexually explicit spam after data leak at British publication, The Guardian. Human error at fault.

Stay Secure

Stay Secure

Connected hotels offer guests more convenience, while ensuring hotel operations run smoothly with the lowest possible overhead. From authenticating Wi-Fi access to installing certificates in security cameras, DigiCert solutions ensure every connected thing-and every guest-stays secure.

Connected Devices in Danger

Connected Devices in Danger

The Hajime worm appears to be the work of a white hat hacker attempting to wrestle control of IoT devices from Mirai and other malicious threats.

REAL-TIME THREAT MONITORING

Guide to Zero-Day Exploits

While you’ve taken steps to secure your network and sensitive data, you’re still at risk of a Zero-Day vulnerability. Maybe you’ve heard the term before but don’t have a deep understanding of how Zero-Day exploits work. Or perhaps, you know about Zero-Day exploits but need actionable insights on how to prevent them.

 

This guide provides an overview of Zero-Day exploits, how they happen, how to detect and identify a Zero-Day attack, and ways you can protect your organization.

 

The Basics: What is a Zero-Day exploit?

A Zero-Day exploit is an undisclosed application vulnerability that could be exploited to negatively affect the hardware, applications, data or network. The term “Zero-Day” refers to the fact that the developers have “zero” days to fix a problem that has just been exposed and may have been already exploited. Hackers seize on that security vulnerability to launch a cyber attack on the same day a weakness is discovered. Basically, the vulnerability is exploited before a fix becomes available.

REAL-TIME THREAT MONITORING

Security Updates

DigiCert CertCentral

Uncommonly Convenient

  • Certificate Discovery
  • ACME for Automation
  • Auto-renewal

VIEW DEMO   

USE CASES

DigiCert Website Security Solutions In The Real World

Small Business eCommerce

Timeless Wrought Iron brings trust to their customers' high-value online purchases

Financial

Papercheck turns to DigiCert for Secure Site SSL/TLS with EV and experiences a 87 percent higher registration rate

VIEW ALL USE CASES   

Join the Community

Join Security Discussions on our Community

Community

Follow Threat Intelligence on Twitter @ThreatIntel

DIGICERT ON TWITTER

Watch Videos on the DigiCert YouTube Channel

DIGICERT ON YOUTUBE

We have updated our Privacy Policy which can be found here.