Blog

SSL.com Blog

The Essential Guide to SAN Certificates

SSL/TLS certificates securely enable HTTPS and other encrypted connections for websites and services. Typically, you need a separate certificate for each hostname or domain you want to protect. This can get expensive for large or complex sites. SAN certificates offer a convenient and cost-effective solution, securing multiple hostnames or domains
Read More »

The NIST Cybersecurity Framework: An In-depth Overview

The National Institute of Standards and Technology’s (NIST) Cybersecurity Framework provides organizations with a systematic approach to understanding, managing, and reducing cybersecurity risk, thereby improving their overall cybersecurity posture. The Framework, which is based on the five basic roles of Identify, Protect, Detect, Respond, and Recover, does not impose a
Read More »

Preparing Your Organization for the Quantum Revolution: A Guide to Implementing Post-Quantum Cryptography

Quantum computers will be potent and pose a massive threat to encrypting data as we know it. Here at SSL.com, we are on top of significant developments in internet security. Before quantum hacking goes mainstream, we advise organizations to switch to quantum-safe “post-quantum” cryptography. Understanding Post-Quantum Crypto Post-quantum cryptography refers
Read More »

A Guide to PKI Protection Using Hardware Security Modules (HSM) 

PKI (Public Key Infrastructure) relies on public and private keys to encrypt data. Hardware Security Modules (HSMs) safeguard these keys in tamper-proof boxes. HSMs store and manage the keys, preventing theft or misuse. They’re vital for PKI security, enabling trusted online transactions and communications. This article explains why HSMs are
Read More »

Cybersecurity Roundup July 2023

Chinese Malware on U.S. Bases in Taiwan: A Sophisticated Cyberattack  Chinese malware has reportedly been detected on the computer systems of U.S. military bases in Taiwan. The strategic and sophisticated nature of these attacks suggests they originate from Chinese nation-state actors.  These cyber intrusions, aimed at disrupting U.S. military activities
Read More »

Follow SSL.com

Subscribe To SSL.Com’s Newsletter

What is SSL/TLS?

Play Video

Subscribe To SSL.Com’s Newsletter

Don’t miss new articles and updates from SSL.com

We’d love your feedback

Take our survey and let us know your thoughts on your recent purchase.