SSL Support Team
Digital certificate revocation is key to PKI security. Learn why it matters and how to manage it in our article.
Read More »
What is the “Unique Value” Used in Domain Validation (DV)?
Domain Validation (DV) is a crucial step in obtaining an SSL/TLS certificate for your website. A key component of this process is the “unique value” used to verify domain ownership.
Read More »
Cybersecurity Roundup July 2024
SSL.com and Entrust Form Strategic Partnership SSL.com is proud to announce a strategic partnership with Entrust, where SSL.com will support Entrust’s public TLS certificate lifecycle,
Read More »
Enabling Third-Party Signing Certificates with eSigner Cloud Signing
Discover how SSL.com’s eSigner cloud signing service securely stores and utilizes third-party digital certificates and keys for enhanced digital signing from anywhere
Read More »
Send a Secure Email using a S/MIME Certificate in the new Outlook for Mac
Learn how to send secure emails using an S/MIME certificate in the new Outlook for Mac. This step-by-step guide by SSL.com ensures your emails are encrypted and authenticated for enhanced security and privacy.
Read More »
SSL.com and Entrust Form Strategic Partnership
SSL.com is pleased to announce a new partnership with Entrust. This collaboration will see SSL.com supporting Entrust’s public TLS certificate lifecycle, ensuring that Entrust continues to meet the highest standards of reliability and customer satisfaction. Entrust will leverage SSL.com’s expertise and full browser ubiquity to provide seamless, secure, and robust certificate services.
Read More »
S/MIME Certificate Management with Microsoft Azure Active Directory and inTune using SSL.com Azure Integration Tool
Introduction Microsoft Intune allows for the integration of imported PFX certificates, which are often used for S/MIME encryption in email profiles. Intune supports the import
Read More »
Yubikey FIPS tokens vs Thales/Gemalto USB tokens
SSL.com ships code signing certificates that are pre-installed on Yubikey FIPS tokens and Thales SafeNet (Gemalto) USB tokens. Both are hardware devices used for secure
Read More »
What is a Digital Certificate?
A digital certificate, also known as a public key certificate or identity certificate, is an electronic document that binds a public key to an entity
Read More »
Cybersecurity Roundup June 2024
Maxicare Healthcare Corporation Suffers Data Breach, Alerts Members Maxicare Healthcare Corporation has alerted its members of a potential data breach compromising personal and medical information
Read More »
How to Sign a Word Document: A Comprehensive Guide
The ability to sign documents electronically has become a crucial skill for professionals, business owners, and individuals. Whether you need to sign a contract, an
Read More »
What is a One-Time Password (OTP)
Keeping our online accounts and personal information safe is more important than ever. With the increasing number of cyber threats, such as hacking, phishing, and
Read More »
Bring Your Own Auditor (BYOA) Guide for Private Key Generation Attestation
SSL.com allows customers who are requesting Code Signing or Adobe Approved Trust List (AATL) Document Signing certificates to use an independent qualified auditor of their
Read More »
Generate a Certificate Signing Request in Azure Key Vault
Effective June 1, 2023, SSL.com has updated its key storage protocols for code signing certificates to comply with new guidelines issued by the Certificate Authority/Browser
Read More »
Contract Signatures: From Ink to eSignatures with SSL.com
Contract signatures have been a fundamental aspect of legal agreements for centuries. As technology has advanced, the process of signing contracts has undergone a significant
Read More »
Cybersecurity Roundup May 2024
Explore SSL.com’s May roundup on critical cybersecurity threats, including the SugarGh0st malware and the ransomware attack on Wichita, and learn how SSL.com certificates protect against these risks.
Read More »
Protect Yourself From Phishing
With so many people working from home, phishing is now a bigger problem than ever. Here’s how to spot phishing emails and websites and defend against them.
Read More »
Lessons Learned, Security Implications and Good Practices for Branded SubCAs
Publicly-trusted Certification Authority owners (PT-CAs) are foundational to the secure functioning of the Internet. They are entrusted by the general, global public and major browser
Read More »
What is an eSeal?
An eSeal provides robust digital security—explore how it simplifies and secures your business documents
Read More »
Cybersecurity Roundup April 2024
Kitchen-Sink Attack Chains: The Primary Cyber Threat to 2024 Elections As the 2024 elections approach, cybersecurity experts warn that the most significant threat to
Read More »
Implementing Code Signing with Google Cloud HSM
Certificate Authorities like SSL.com have recently heightened the key storage standards for Code Signing Certificates, now mandating the storage of the certificate’s private key either
Read More »
SSL Certificate Expiration Guide
Why do SSL Certificates Expire? Think of an SSL certificate as a passport for your website, verifying its identity and ensuring secure connections. Just as
Read More »
Understanding the Zero Trust Security Model
Zero Trust is a security model that assumes all users, devices, and applications are untrusted by default, regardless of physical or network location. Instead of
Read More »
A Guide to SSL/TLS and Client Authentication Certificates for Containers
As a developer working with containers, you are responsible for protecting sensitive data and maintaining your users’ trust. Implementing SSL/TLS certificates for encryption and client
Read More »
Key Management Best Practices: A Practical Guide
As digital transformation accelerates across industries, organizations rely more heavily on cryptographic keys to secure data and enable secure digital processes. Cryptographic keys form the
Read More »