SSL Support Team
Learn about the ACME protocol – an automated method for managing SSL/TLS certificate lifecycles. Discover how it streamlines certificate issuance, renewal, and improves website security through standardized automation.
Read More »
October 2024 Cybersecurity Roundup
Lazarus Group Exploits Chrome Zero-Day to Target Cryptocurrency Sector The North Korean Lazarus Group exploited a now-patched Chrome zero-day vulnerability (CVE-2024-4947) to gain control of
Read More »
Pharming Explained: How to Prevent DNS-Based Cyber Attacks
Pharming is a sophisticated cyberattack that exploits DNS vulnerabilities to redirect users to fraudulent websites. Learn how to recognize, prevent, and respond to these DNS-based threats.
Read More »
SSL.com to Deprecate Domain Contact-Based Email Domain Control Validation on December 2, 2024
Starting December 2, 2024, the WHOIS-based email domain control validation (DCV) method to obtain SSL/TLS certificates will no longer be accepted by SSL.com. It has
Read More »
Sending Secure Email with S/MIME
Secure email should be part of your business strategy, and S/MIME certificates from SSL.com are a great way to protect and authenticate your messages.
Read More »
Bulk Enrollment of Basic S/MIME and NAESB Certificates
SSL.com provides bulk ordering and enrollment of Basic S/MIME and NAESB certificates through our bulk order tool. This guide will walk you through the enrollment
Read More »
SSL.com’s Reseller and Volume Purchasing Program
SSL.com’s Reseller and Volume Purchasing program is for customers who need a large number of certificates and would like wholesale pricing.
Read More »
Private vs Public PKI: Building an Effective Plan
Learn how to build an effective private or public PKI plan, incorporating trends like post-quantum cryptography, PKI automation, and industry-specific considerations.
Read More »
What is Public Key Infrastructure (PKI)?
Discover what Public Key Infrastructure (PKI) is, its main components, and how it secures electronic communications using cryptographic mechanisms like digital certificates and key pairs to ensure confidentiality, integrity, authentication, and non-repudiation.
Read More »
Bulk Ordering Identity Pre-Validation Agreement Setup
What is a Pre-Validation Agreement? A Bulk Ordering Identity Pre-Validation Agreement allows an authorized representative to assume responsibility for retaining and validating identity evidence of
Read More »
How Simple Passwords and Employees Put Cybersecurity at Risk
Discover how simple passwords and employee negligence can jeopardize your organization’s cybersecurity, and learn practical steps to strengthen your defenses against cyber threats.
Read More »
Comparing ECDSA vs RSA: A Simple Guide
Compare ECDSA and RSA cryptographic algorithms: key features, security, performance, and use cases. Learn when to choose each for digital signatures and encryption.
Read More »
Cybersecurity Roundup September 2024
SSL.com and Entrust Form Strategic Partnership SSL.com is proud to announce a strategic partnership with Entrust, where SSL.com will support Entrust’s public TLS certificate lifecycle,
Read More »
What is an SSL/TLS Certificate?
Learn about SSL certificates: what they are, how they work, and why they’re crucial for website security. Explore types, benefits, and implementation.
Read More »
Avoid Common HTTPS Errors: A Simple Guide
Quick guide to fixing common HTTPS errors. Learn to identify and resolve SSL/TLS issues for secure browsing and website management.
Read More »
What is Elliptic Curve Cryptography (ECC)?
Elliptic Curve Cryptography explained: Efficient public-key encryption for modern cybersecurity, from web security to cryptocurrencies.
Read More »
What is a Cryptographic Protocol?
Discover cryptographic protocols—rules ensuring secure communication and data protection online, including SSL/TLS, SSH, and more.
Read More »
What is Public-Key Cryptography?
Learn about public-key cryptography, its applications in SSL/TLS, and how it secures digital communications. Explore algorithms, benefits, and future trends in online security.
Read More »
Certificate Transparency
An exploration of Certificate Transparency (CT), its importance, recent developments, and future directions in web security.
Read More »
What is HTTP Strict Transport Security (HSTS)?
Learn about HTTP Strict Transport Security (HSTS), a crucial web security mechanism that enforces HTTPS connections. Discover its benefits, implementation steps, and best practices for protecting your website against common attacks.
Read More »
What is a Code Signing Certificate?
Learn about code signing certificates: what they are, how they work, their benefits for software security and trust, and best practices for implementation. Explore SSL.com solutions.
Read More »
Unified Communications Certificate (UCC): A Comprehensive Guide
Learn about Unified Communications Certificates (UCCs), how they secure multiple domains, their benefits, and best practices for implementation and management.
Read More »
What is a Root Store?
Root stores: Key components of internet security. Learn about these trusted certificate collections and their role in cybersecurity.
Read More »
Bulk Certificate Enrollment for S/MIME and ClientAuth Certificates
SSL.com provides an efficient way to order a high volume of digital certificates through the bulk order tool. It is capable of processing all validation
Read More »
Cybersecurity Roundup August 2024
Stay informed with SSL.com’s August 2024 Cybersecurity Roundup, featuring insights on PEAKLIGHT malware, BlackByte ransomware, and others. Learn more!
Read More »