Tag: Digicert

2022 New Year

Spotlight: COVID, Cloud Sovereignty and Other 2022 Trends with DigiCert

What does 2022 have in store? Dean Coclin of DigiCert speaks with host Paul Roberts about the trends that will shape the New Year, from cloud sovereignty to the growing reliance on PKI to secure digital identities, DEVOPs and more.

Digital Certificates

Spotlight: Automation Beckons as DevOps, IoT Drive PKI Explosion

Brian Trzupek of DigiCert joins Paul to talk about the findings of a recent State of PKI Automation survey and the challenges of managing fast-growing population of tens of thousands of PKI certificates.

Digital Signature Concept

Episode 216: Signed, Sealed and Delivered: The Future of Supply Chain Security

In this episode of the podcast
(#216) we talk with Brian Trzupek, Digicert’s Vice President of Product, about the growing urgency of securing software supply chains, and how digital code signing can help prevent compromises like the recent hack of the firm SolarWinds.

Internet of Things Concept - Tree

PKI Points the Way for Identity and Authentication in IoT

Modern enterprise networks are populated by both people and, increasingly, “things.” But securing the growing population of Internet of Things devices presents unique challenges. In this thought leadership article, Brian Trzupek, the Senior Vice President of Emerging Markets at DigiCert discusses what is needed for effective IoT security.

Working the phones at a campaign

Episode 175: Campaign Security lags. Also: securing Digital Identities in the age of the DeepFake

In this episode of The Security Ledger Podcast (Episode #175), sponsored by Digicert: its been three years since the hacks made famous during the 2016 election, but online campaigns still struggle with basic security. Andrew Peterson of the firm Signal Sciences joins us to talk about why. Also: in part 2 of our podcast we’re joined by Dan Timpson, Chief Technology Officer at Digicert to talk about the fast expanding terrain of securing online identities in an age of ubiquitous computing, deep fakes and connected devices.