Garantir Blog

Check out the latest cybersecurity posts from Garantir on topics like key management, secure software development, code signing, privileged access management (PAM), and more.

graphic of Cryptographic Timestamping

Cryptographic Timestamping

What Time is it? In a previous post we mentioned the importance of using cryptographic timestamping to avoid issues related to expiring and, in some cases, revoked certificates. But what is cryptographic timestamping, how does...