SSL Support Team
Stay updated with SSL.com’s November cybersecurity roundup: new 45-day SSL/TLS certs, T-Mobile defense, ransomware impacts, and more.
Read More »
How to Automate EV Code Signing With SignTool.exe or Certutil.exe Using eSigner CKA (Cloud Key Adapter)
eSigner CKA (Cloud Key Adapter) is a Windows based application that uses the CNG interface (KSP Key Service Provider) to allow tools such as certutil.exe
Read More »
Streamlining Digital Signature Workflows with eSigner Integration
As businesses increasingly adopt digital signature solutions to streamline their document signing processes, choosing the right integration method is crucial for a seamless and efficient
Read More »
How to Digitally Sign vsix files using eSigner CKA
A .vsix file is a Visual Studio Extension Installer package used by Microsoft Visual Studio. It contains software that adds new functionality or extends existing
Read More »
How to Digitally Sign VBA Macros using eSigner CKA
eSigner CKA (Cloud Key Adapter) is a Windows application leveraging the CNG interface (KSP Key Service Provider), enabling tools like certutil.exe and signtool.exe to access
Read More »
How to Digitally Sign a Hardware Lab Kit (HLK) file using eSigner CKA
Hardware Lab Kit is a tool to test and prepare a kernel mode driver for submission to Microsoft. Currently eSigner CKA also requires the HLKSigntool
Read More »
How to Digitally Sign .app Files using eSigner CKA
The Microsoft_Application.app file comprehensively encompasses all components of a solution, offering a streamlined method to establish and reference the identity of the solution. eSigner CKA
Read More »
OCSP Stapling: Secure and Efficient Certificate Validation
Learn how OCSP stapling enhances SSL/TLS certificate validation by improving performance, privacy, and reliability, and discover how to implement it on your server.
Read More »
What Is the ACME Protocol?
Learn about the ACME protocol – an automated method for managing SSL/TLS certificate lifecycles. Discover how it streamlines certificate issuance, renewal, and improves website security through standardized automation.
Read More »
October 2024 Cybersecurity Roundup
Lazarus Group Exploits Chrome Zero-Day to Target Cryptocurrency Sector The North Korean Lazarus Group exploited a now-patched Chrome zero-day vulnerability (CVE-2024-4947) to gain control of
Read More »
Pharming Explained: How to Prevent DNS-Based Cyber Attacks
Pharming is a sophisticated cyberattack that exploits DNS vulnerabilities to redirect users to fraudulent websites. Learn how to recognize, prevent, and respond to these DNS-based threats.
Read More »
SSL.com to Deprecate Domain Contact-Based Email Domain Control Validation on December 2, 2024
Starting December 2, 2024, the WHOIS-based email domain control validation (DCV) method to obtain SSL/TLS certificates will no longer be accepted by SSL.com. It has
Read More »
Sending Secure Email with S/MIME
Secure email should be part of your business strategy, and S/MIME certificates from SSL.com are a great way to protect and authenticate your messages.
Read More »
Bulk Enrollment of Basic S/MIME and NAESB Certificates
SSL.com provides bulk ordering and enrollment of Basic S/MIME and NAESB certificates through our bulk order tool. This guide will walk you through the enrollment
Read More »
SSL.com’s Reseller and Volume Purchasing Program
SSL.com’s Reseller and Volume Purchasing program is for customers who need a large number of certificates and would like wholesale pricing.
Read More »
Private vs Public PKI: Building an Effective Plan
Learn how to build an effective private or public PKI plan, incorporating trends like post-quantum cryptography, PKI automation, and industry-specific considerations.
Read More »
What is Public Key Infrastructure (PKI)?
Discover what Public Key Infrastructure (PKI) is, its main components, and how it secures electronic communications using cryptographic mechanisms like digital certificates and key pairs to ensure confidentiality, integrity, authentication, and non-repudiation.
Read More »
Bulk Ordering Identity Pre-Validation Agreement Setup
What is a Pre-Validation Agreement? A Bulk Ordering Identity Pre-Validation Agreement allows an authorized representative to assume responsibility for retaining and validating identity evidence of
Read More »
How Simple Passwords and Employees Put Cybersecurity at Risk
Discover how simple passwords and employee negligence can jeopardize your organization’s cybersecurity, and learn practical steps to strengthen your defenses against cyber threats.
Read More »
Comparing ECDSA vs RSA: A Simple Guide
Compare ECDSA and RSA cryptographic algorithms: key features, security, performance, and use cases. Learn when to choose each for digital signatures and encryption.
Read More »
Cybersecurity Roundup September 2024
SSL.com and Entrust Form Strategic Partnership SSL.com is proud to announce a strategic partnership with Entrust, where SSL.com will support Entrust’s public TLS certificate lifecycle,
Read More »
What is an SSL/TLS Certificate?
Learn about SSL certificates: what they are, how they work, and why they’re crucial for website security. Explore types, benefits, and implementation.
Read More »
Avoid Common HTTPS Errors: A Simple Guide
Quick guide to fixing common HTTPS errors. Learn to identify and resolve SSL/TLS issues for secure browsing and website management.
Read More »
What is Elliptic Curve Cryptography (ECC)?
Elliptic Curve Cryptography explained: Efficient public-key encryption for modern cybersecurity, from web security to cryptocurrencies.
Read More »
What is a Cryptographic Protocol?
Discover cryptographic protocols—rules ensuring secure communication and data protection online, including SSL/TLS, SSH, and more.
Read More »