SSL Support Team
The widespread adoption of remote work and paperless workflows has accelerated the need for secure digital document signing. Implementing the right e-signature solution can significantly
Read More »
Self-Signed Certificate Vulnerabilities
Self-signed certificates are an easy way to enable SSL/TLS encryption for your websites and services. But behind this convenience lies significant security risks that leave
Read More »
What is SSL/TLS: An In-Depth Guide
This guide provides an in-depth overview of SSL/TLS (Secure Sockets Layer and Transport Layer Security) – cryptographic protocols enabling secure internet communication. We will explain
Read More »
What Is Certificate Pinning?
What is Certificate Pinning? Certificate pinning is a security mechanism used in the context of authenticating client-server connections, particularly in the context of secure communication
Read More »
Cybersecurity Roundup September 2023
Tax Time Updates: IRS Plans for Fully Digital Processing by 2025 The IRS is set to digitize all taxpayer documents by 2025, with the
Read More »
On-Premises vs. Cloud HSMs: A Comparison
Organizations rely on Hardware Security Modules (HSMs) to safeguard cryptographic keys and accelerate cryptographic operations for critical applications. HSMs come in two primary deployment models:
Read More »
Certificate Authority Security Best Practices Guide for Branded Resellers: Comprehensive Security Measures
Introduction As a leading Certificate Authority (CA) and a trust services company, we prioritize the security and trustworthiness of our digital certificates and our identity
Read More »
SSL/TLS Handshake: Ensuring Secure Online Interactions
Whenever we visit a website, make an online purchase, or check our email, data is transmitted back and forth between our devices and remote servers.
Read More »
Best Practices on Enabling LTV Signatures for Document Signing Using Self-managed HSMs
SSL.com provides turn-key remote cloud signing services through our eSigner signing operations API which includes the storage and management of private keys. However, many users
Read More »
Cybersecurity Roundup August 2023
Google Chrome Introduces Safety Checks for Browser Extensions Google Chrome is implementing a new feature to enhance user security by warning them about potentially malicious
Read More »
The Essential Guide to SAN Certificates
SSL/TLS certificates securely enable HTTPS and other encrypted connections for websites and services. Typically, you need a separate certificate for each hostname or domain you
Read More »
The NIST Cybersecurity Framework: An In-depth Overview
The National Institute of Standards and Technology’s (NIST) Cybersecurity Framework provides organizations with a systematic approach to understanding, managing, and reducing cybersecurity risk, thereby improving
Read More »
Preparing Your Organization for the Quantum Revolution: A Guide to Implementing Post-Quantum Cryptography
Quantum computers will be potent and pose a massive threat to encrypting data as we know it. Here at SSL.com, we are on top of
Read More »
A Guide to PKI Protection Using Hardware Security Modules (HSM)
PKI (Public Key Infrastructure) relies on public and private keys to encrypt data. Hardware Security Modules (HSMs) safeguard these keys in tamper-proof boxes. HSMs store
Read More »
SSL.com Legacy Cross-Signed Root Certificate Expiring on September 11, 2023
What is a cross-signed root certificate? A cross-signed root certificate is a digital certificate issued by one Certificate Authority (CA) that is used to establish
Read More »
Cybersecurity Roundup July 2023
Chinese Malware on U.S. Bases in Taiwan: A Sophisticated Cyberattack Chinese malware has reportedly been detected on the computer systems of U.S. military bases in
Read More »
The importance of migrating to SHA2 for your Private PKI
The IT sector has seen a trend in recent years toward replacing less safe cryptographic algorithms like SHA-1 with more secure ones like SHA-2. This
Read More »
Cybersecurity Roundup June 2023
Massive Data Breach Hits California’s CalPERS and CalSTRS: Personal Information of 769,000 Retirees Compromised Hackers have compromised the personal information of roughly 769,000 retirees and
Read More »
Validation Process for Document Signing, Code Signing, and EV Code Signing Certificates
This how-to will walk you through the process of buying and submitting required documents for all SSL.com Document Signing certificates, as well as IV and
Read More »
Validating by CSR hash for cpanel
This how-to will walk you through validating a certificate signing request (CSR) in cPanel. In the validation page, select the CSR Hash validation method: either
Read More »
Ordering Process for Code and Document Signing Certificates
Both code signing and document signing certificates have similar options when it comes to storage of the private keys and options for signing. All code
Read More »
Bulk Enrollment of Personal ID+Organization S/MIME Certificates
SSL.com provides bulk ordering and enrollment of Personal ID+Organization S/MIME certificates (also known as IV+OV S/MIME), through our bulk order tool. This guide will walk you
Read More »
Cybersecurity Roundup May 2023
Critical Lessons from the MCNA Cyberattack: A Tale of Nine Million Breached Records The recent cyberattack on Managed Care of North America (MCNA), one of
Read More »
How to Use Pre-Signing Malware Scan with SSL.com eSigner
What is SSL.com Malware Scan? Malware Scan is a new service offered by SSL.com to software developers utilizing code signing certificates to assure that code
Read More »