Category: Platform
Learn how digital certificates protect healthcare organizations from cyberattacks by securing patient data, medical devices, and communications while ensuring HIPAA compliance. Discover essential certificate types and implementation strategies for robust healthcare cybersecurity.
Read More »
Why Law Firms Should Invest More in Cybersecurity
Explore why law firms must prioritize cybersecurity investments today. Learn about unique vulnerabilities, rising cyber threats, essential security measures, and the business case for protecting sensitive legal data.
Read More »
How to Install SSL.com eSigner Cloud Key Adapter (CKA)
eSigner CKA (Cloud Key Adapter) is a Windows based application that uses the CNG interface (KSP Key Service Provider) to allow various tools to use
Read More »
What Is the ACME Protocol?
Learn about the ACME protocol – an automated method for managing SSL/TLS certificate lifecycles. Discover how it streamlines certificate issuance, renewal, and improves website security through standardized automation.
Read More »
Authenticating Users and IoT Devices with Mutual TLS
Learn how to implement mutual TLS (mTLS) authentication for securing user and IoT device connections. Includes step-by-step certificate setup, server configuration, client implementation, and troubleshooting guidelines.
Read More »
Private vs Public PKI: Building an Effective Plan
Learn how to build an effective private or public PKI plan, incorporating trends like post-quantum cryptography, PKI automation, and industry-specific considerations.
Read More »
What is Public Key Infrastructure (PKI)?
Discover what Public Key Infrastructure (PKI) is, its main components, and how it secures electronic communications using cryptographic mechanisms like digital certificates and key pairs to ensure confidentiality, integrity, authentication, and non-repudiation.
Read More »
How Simple Passwords and Employees Put Cybersecurity at Risk
Discover how simple passwords and employee negligence can jeopardize your organization’s cybersecurity, and learn practical steps to strengthen your defenses against cyber threats.
Read More »
Comparing ECDSA vs RSA: A Simple Guide
Compare ECDSA and RSA cryptographic algorithms: key features, security, performance, and use cases. Learn when to choose each for digital signatures and encryption.
Read More »
Avoid Common HTTPS Errors: A Simple Guide
Quick guide to fixing common HTTPS errors. Learn to identify and resolve SSL/TLS issues for secure browsing and website management.
Read More »
What is Elliptic Curve Cryptography (ECC)?
Elliptic Curve Cryptography explained: Efficient public-key encryption for modern cybersecurity, from web security to cryptocurrencies.
Read More »
What is a Cryptographic Protocol?
Discover cryptographic protocols—rules ensuring secure communication and data protection online, including SSL/TLS, SSH, and more.
Read More »
What is Public-Key Cryptography?
Learn about public-key cryptography, its applications in SSL/TLS, and how it secures digital communications. Explore algorithms, benefits, and future trends in online security.
Read More »
What is HTTP Strict Transport Security (HSTS)?
Learn about HTTP Strict Transport Security (HSTS), a crucial web security mechanism that enforces HTTPS connections. Discover its benefits, implementation steps, and best practices for protecting your website against common attacks.
Read More »
Using Your Code Signing Certificate
How to use your OV or EV code signing certificate with Microsoft’s SignTool and SSL.com’s SSL Manager application.
Read More »
SafeNet Authentication Client Download for Code Signing Certificates
How to download the SafeNet client. For certificates on Thales-Gemalto USB tokens.
Read More »
Send a Secure Email using a S/MIME Certificate in the new Outlook for Mac
Learn how to send secure emails using an S/MIME certificate in the new Outlook for Mac. This step-by-step guide by SSL.com ensures your emails are encrypted and authenticated for enhanced security and privacy.
Read More »
S/MIME Certificate Management with Microsoft Azure Active Directory and inTune using SSL.com Azure Integration Tool
Introduction Microsoft Intune allows for the integration of imported PFX certificates, which are often used for S/MIME encryption in email profiles. Intune supports the import
Read More »
What is a Digital Certificate?
A digital certificate, also known as a public key certificate or identity certificate, is an electronic document that binds a public key to an entity
Read More »
Generate a Certificate Signing Request in Azure Key Vault
Effective June 1, 2023, SSL.com has updated its key storage protocols for code signing certificates to comply with new guidelines issued by the Certificate Authority/Browser
Read More »
Implementing Code Signing with Google Cloud HSM
Certificate Authorities like SSL.com have recently heightened the key storage standards for Code Signing Certificates, now mandating the storage of the certificate’s private key either
Read More »
S/MIME Installation for Outlook Android and iOS
Requirements for S/MIME Setup To ensure optimal security in Exchange Online, it’s crucial to configure S/MIME according to the guidelines specified in the ‘Configure S/MIME
Read More »
Quantum Proofing Next Generation PKI and Digital Certificates
Even in 2016, articles about quantum computers created uncertainties surrounding data security, in the case that sufficiently powerful quantum computers could be built. This article
Read More »
Installing an S/MIME Certificate and Sending Secure Email in Mozilla Thunderbird on Windows 10
These instructions detail how to install an S/MIME certificate and send secure email messages with Mozilla Thunderbird on Windows PCs.
Read More »
On-Premises vs. Cloud HSMs: A Comparison
Organizations rely on Hardware Security Modules (HSMs) to safeguard cryptographic keys and accelerate cryptographic operations for critical applications. HSMs come in two primary deployment models:
Read More »