SSL Support Team
Explore SSL.com’s December 2024 Cybersecurity Roundup: insights on the US Treasury breach, healthcare data risks, and tips for fortifying your security.
Read More »
Healthcare Cyberattacks Are on the Rise – Digital Certificates Can Help
Learn how digital certificates protect healthcare organizations from cyberattacks by securing patient data, medical devices, and communications while ensuring HIPAA compliance. Discover essential certificate types and implementation strategies for robust healthcare cybersecurity.
Read More »
Why Law Firms Should Invest More in Cybersecurity
Explore why law firms must prioritize cybersecurity investments today. Learn about unique vulnerabilities, rising cyber threats, essential security measures, and the business case for protecting sensitive legal data.
Read More »
Add Digital Signatures to Microsoft Office 365 Documents using eSigner CKA
Securely sign Office 365 documents using SSL.com’s eSigner CKA, simplifying digital signatures without the need for physical tokens.
Read More »
Digitally Sign a PDF on Adobe Acrobat Reader using eSigner CKA
Discover how to digitally sign PDFs in Adobe Acrobat Reader using SSL.com’s eSigner CKA, a secure and efficient alternative to USB tokens.
Read More »
How to Install SSL.com eSigner Cloud Key Adapter (CKA)
eSigner CKA (Cloud Key Adapter) is a Windows based application that uses the CNG interface (KSP Key Service Provider) to allow various tools to use
Read More »
November 2024 Cybersecurity Roundup
Stay updated with SSL.com’s November cybersecurity roundup: new 45-day SSL/TLS certs, T-Mobile defense, ransomware impacts, and more.
Read More »
How to Automate EV Code Signing With SignTool.exe or Certutil.exe Using eSigner CKA (Cloud Key Adapter)
eSigner CKA (Cloud Key Adapter) is a Windows based application that uses the CNG interface (KSP Key Service Provider) to allow tools such as certutil.exe
Read More »
Streamlining Digital Signature Workflows with eSigner Integration
As businesses increasingly adopt digital signature solutions to streamline their document signing processes, choosing the right integration method is crucial for a seamless and efficient
Read More »
How to Digitally Sign vsix files using eSigner CKA
A .vsix file is a Visual Studio Extension Installer package used by Microsoft Visual Studio. It contains software that adds new functionality or extends existing
Read More »
How to Digitally Sign VBA Macros using eSigner CKA
eSigner CKA (Cloud Key Adapter) is a Windows application leveraging the CNG interface (KSP Key Service Provider), enabling tools like certutil.exe and signtool.exe to access
Read More »
How to Digitally Sign a Hardware Lab Kit (HLK) file using eSigner CKA
Hardware Lab Kit is a tool to test and prepare a kernel mode driver for submission to Microsoft. Currently eSigner CKA also requires the HLKSigntool
Read More »
How to Digitally Sign .app Files using eSigner CKA
The Microsoft_Application.app file comprehensively encompasses all components of a solution, offering a streamlined method to establish and reference the identity of the solution. eSigner CKA
Read More »
OCSP Stapling: Secure and Efficient Certificate Validation
Learn how OCSP stapling enhances SSL/TLS certificate validation by improving performance, privacy, and reliability, and discover how to implement it on your server.
Read More »
What Is the ACME Protocol?
Learn about the ACME protocol – an automated method for managing SSL/TLS certificate lifecycles. Discover how it streamlines certificate issuance, renewal, and improves website security through standardized automation.
Read More »
Authenticating Users and IoT Devices with Mutual TLS
Learn how to implement mutual TLS (mTLS) authentication for securing user and IoT device connections. Includes step-by-step certificate setup, server configuration, client implementation, and troubleshooting guidelines.
Read More »
October 2024 Cybersecurity Roundup
Lazarus Group Exploits Chrome Zero-Day to Target Cryptocurrency Sector The North Korean Lazarus Group exploited a now-patched Chrome zero-day vulnerability (CVE-2024-4947) to gain control of
Read More »
Pharming Explained: How to Prevent DNS-Based Cyber Attacks
Pharming is a sophisticated cyberattack that exploits DNS vulnerabilities to redirect users to fraudulent websites. Learn how to recognize, prevent, and respond to these DNS-based threats.
Read More »
SSL.com to Deprecate Domain Contact-Based Email Domain Control Validation on December 2, 2024
Starting December 2, 2024, the WHOIS-based email domain control validation (DCV) method to obtain SSL/TLS certificates will no longer be accepted by SSL.com. It has
Read More »
Sending Secure Email with S/MIME
Secure email should be part of your business strategy, and S/MIME certificates from SSL.com are a great way to protect and authenticate your messages.
Read More »
Bulk Enrollment of Basic S/MIME and NAESB Certificates
SSL.com provides bulk ordering and enrollment of Basic S/MIME and NAESB certificates through our bulk order tool. This guide will walk you through the enrollment
Read More »
SSL.com’s Reseller and Volume Purchasing Program
SSL.com’s Reseller and Volume Purchasing program is for customers who need a large number of certificates and would like wholesale pricing.
Read More »
Private vs Public PKI: Building an Effective Plan
Learn how to build an effective private or public PKI plan, incorporating trends like post-quantum cryptography, PKI automation, and industry-specific considerations.
Read More »
What is Public Key Infrastructure (PKI)?
Discover what Public Key Infrastructure (PKI) is, its main components, and how it secures electronic communications using cryptographic mechanisms like digital certificates and key pairs to ensure confidentiality, integrity, authentication, and non-repudiation.
Read More »
Bulk Ordering Identity Pre-Validation Agreement Setup
What is a Pre-Validation Agreement? A Bulk Ordering Identity Pre-Validation Agreement allows an authorized representative to assume responsibility for retaining and validating identity evidence of
Read More »