SSL Support Team
This guide shows how to install a Client Authentication certificate in the Windows certificate store and generate an access password for the certificate. Normally a
Read More »
February 2025 Cybersecurity Roundup
Stay ahead of cyber threats! Read SSL.com’s February Cybersecurity Roundup for key data breaches, ransomware attacks, and security insights.
Read More »
Multi-Perspective Issuance Corroboration (MPIC) Arrives
On March 15, 2025, SSL.com will implement an initial deployment of MPIC. This update is in support of the requirements defined in Ballot SC-067 v3
Read More »
How to Locate the Certificate Fingerprint and Serial Number
Knowing your certificate’s fingerprint and serial number is highly useful when requesting a certificate to be revoked. This information is usually required by the Certificate
Read More »
January 2025 Cybersecurity Roundup
Stay ahead of cyber threats with SSL.com’s January 2025 cybersecurity roundup—AI data leaks, ransomware, mobile security, and more. Protect your data today!
Read More »
Understanding CAA Check Failures and How to Resolve Them
Learn how to fix CAA check failures and secure your domain. This guide covers common issues, DNSSEC errors, and actionable solutions for TLS certificates.
Read More »
December 2024 Cybersecurity Roundup
Explore SSL.com’s December 2024 Cybersecurity Roundup: insights on the US Treasury breach, healthcare data risks, and tips for fortifying your security.
Read More »
Healthcare Cyberattacks Are on the Rise – Digital Certificates Can Help
Learn how digital certificates protect healthcare organizations from cyberattacks by securing patient data, medical devices, and communications while ensuring HIPAA compliance. Discover essential certificate types and implementation strategies for robust healthcare cybersecurity.
Read More »
Why Law Firms Should Invest More in Cybersecurity
Explore why law firms must prioritize cybersecurity investments today. Learn about unique vulnerabilities, rising cyber threats, essential security measures, and the business case for protecting sensitive legal data.
Read More »
Add Digital Signatures to Microsoft Office 365 Documents using eSigner CKA
Securely sign Office 365 documents using SSL.com’s eSigner CKA, simplifying digital signatures without the need for physical tokens.
Read More »
Digitally Sign a PDF on Adobe Acrobat Reader using eSigner CKA
Discover how to digitally sign PDFs in Adobe Acrobat Reader using SSL.com’s eSigner CKA, a secure and efficient alternative to USB tokens.
Read More »
How to Install SSL.com eSigner Cloud Key Adapter (CKA)
eSigner CKA (Cloud Key Adapter) is a Windows based application that uses the CNG interface (KSP Key Service Provider) to allow various tools to use
Read More »
November 2024 Cybersecurity Roundup
Stay updated with SSL.com’s November cybersecurity roundup: new 45-day SSL/TLS certs, T-Mobile defense, ransomware impacts, and more.
Read More »
How to Automate EV Code Signing With SignTool.exe or Certutil.exe Using eSigner CKA (Cloud Key Adapter)
eSigner CKA (Cloud Key Adapter) is a Windows based application that uses the CNG interface (KSP Key Service Provider) to allow tools such as certutil.exe
Read More »
Streamlining Digital Signature Workflows with eSigner Integration
As businesses increasingly adopt digital signature solutions to streamline their document signing processes, choosing the right integration method is crucial for a seamless and efficient
Read More »
How to Digitally Sign vsix files using eSigner CKA
A .vsix file is a Visual Studio Extension Installer package used by Microsoft Visual Studio. It contains software that adds new functionality or extends existing
Read More »
How to Digitally Sign VBA Macros using eSigner CKA
eSigner CKA (Cloud Key Adapter) is a Windows application leveraging the CNG interface (KSP Key Service Provider), enabling tools like certutil.exe and signtool.exe to access
Read More »
How to Digitally Sign a Hardware Lab Kit (HLK) file using eSigner CKA
Hardware Lab Kit is a tool to test and prepare a kernel mode driver for submission to Microsoft. Currently eSigner CKA also requires the HLKSigntool
Read More »
How to Digitally Sign .app Files using eSigner CKA
The Microsoft_Application.app file comprehensively encompasses all components of a solution, offering a streamlined method to establish and reference the identity of the solution. eSigner CKA
Read More »
OCSP Stapling: Secure and Efficient Certificate Validation
Learn how OCSP stapling enhances SSL/TLS certificate validation by improving performance, privacy, and reliability, and discover how to implement it on your server.
Read More »
What Is the ACME Protocol?
Learn about the ACME protocol – an automated method for managing SSL/TLS certificate lifecycles. Discover how it streamlines certificate issuance, renewal, and improves website security through standardized automation.
Read More »
Authenticating Users and IoT Devices with Mutual TLS
Learn how to implement mutual TLS (mTLS) authentication for securing user and IoT device connections. Includes step-by-step certificate setup, server configuration, client implementation, and troubleshooting guidelines.
Read More »
October 2024 Cybersecurity Roundup
Lazarus Group Exploits Chrome Zero-Day to Target Cryptocurrency Sector The North Korean Lazarus Group exploited a now-patched Chrome zero-day vulnerability (CVE-2024-4947) to gain control of
Read More »
Pharming Explained: How to Prevent DNS-Based Cyber Attacks
Pharming is a sophisticated cyberattack that exploits DNS vulnerabilities to redirect users to fraudulent websites. Learn how to recognize, prevent, and respond to these DNS-based threats.
Read More »
SSL.com to Deprecate Domain Contact-Based Email Domain Control Validation on December 2, 2024
Starting December 2, 2024, the WHOIS-based email domain control validation (DCV) method to obtain SSL/TLS certificates will no longer be accepted by SSL.com. It has
Read More »