Search Results for: protocol – Page 2
Digital certificate revocation is key to PKI security. Learn why it matters and how to manage it in our article.
Read More »
Cybersecurity Roundup July 2024
SSL.com and Entrust Form Strategic Partnership SSL.com is proud to announce a strategic partnership with Entrust, where SSL.com will support Entrust’s public TLS certificate lifecycle,
Read More »
S/MIME Certificate Management with Microsoft Azure Active Directory and inTune using SSL.com Azure Integration Tool
Introduction Microsoft Intune allows for the integration of imported PFX certificates, which are often used for S/MIME encryption in email profiles. Intune supports the import
Read More »
Yubikey FIPS tokens vs Thales/Gemalto USB tokens
SSL.com ships code signing certificates that are pre-installed on Yubikey FIPS tokens and Thales SafeNet (Gemalto) USB tokens. Both are hardware devices used for secure
Read More »
What is a Digital Certificate?
A digital certificate, also known as a public key certificate or identity certificate, is an electronic document that binds a public key to an entity
Read More »
Cybersecurity Roundup June 2024
Maxicare Healthcare Corporation Suffers Data Breach, Alerts Members Maxicare Healthcare Corporation has alerted its members of a potential data breach compromising personal and medical information
Read More »
Generate a Certificate Signing Request in Azure Key Vault
Effective June 1, 2023, SSL.com has updated its key storage protocols for code signing certificates to comply with new guidelines issued by the Certificate Authority/Browser
Read More »
Cybersecurity Roundup May 2024
Explore SSL.com’s May roundup on critical cybersecurity threats, including the SugarGh0st malware and the ransomware attack on Wichita, and learn how SSL.com certificates protect against these risks.
Read More »
Protect Yourself From Phishing
With so many people working from home, phishing is now a bigger problem than ever. Here’s how to spot phishing emails and websites and defend against them.
Read More »
Cybersecurity Roundup April 2024
Kitchen-Sink Attack Chains: The Primary Cyber Threat to 2024 Elections As the 2024 elections approach, cybersecurity experts warn that the most significant threat to
Read More »
SSL Certificate Expiration Guide
Why do SSL Certificates Expire? Think of an SSL certificate as a passport for your website, verifying its identity and ensuring secure connections. Just as
Read More »
A Guide to SSL/TLS and Client Authentication Certificates for Containers
As a developer working with containers, you are responsible for protecting sensitive data and maintaining your users’ trust. Implementing SSL/TLS certificates for encryption and client
Read More »
Key Management Best Practices: A Practical Guide
As digital transformation accelerates across industries, organizations rely more heavily on cryptographic keys to secure data and enable secure digital processes. Cryptographic keys form the
Read More »
S/MIME Installation for Outlook Android and iOS
Requirements for S/MIME Setup To ensure optimal security in Exchange Online, it’s crucial to configure S/MIME according to the guidelines specified in the ‘Configure S/MIME
Read More »
Cybersecurity Roundup March 2024
AT&T Confirms Massive Data Breach Impacting 73 Million Customers, Including Compromised Passcodes After initially denying the authenticity of a leaked dataset containing sensitive information of
Read More »
SSL Certificates and SEO: How to Optimize for Search Engine Visibility
Search engine optimization is a moving target – Google’s algorithms change constantly. However, one constant for boosting your SEO is adopting HTTPS and SSL certificates
Read More »
Quantum Proofing Next Generation PKI and Digital Certificates
Even in 2016, articles about quantum computers created uncertainties surrounding data security, in the case that sufficiently powerful quantum computers could be built. This article
Read More »
The Essential Guide to S/MIME for Secure Email Communications
Despite the rise of messaging services, email continues to be the primary channel for business communication. Not only is email use growing, security breaches through
Read More »
Cybersecurity Roundup January 2024
Coyote Trojan Targets Banking Apps with Advanced Evasion Techniques Kaspersky’s discovery of the Coyote banking Trojan, targeting 61 online banking apps mainly in Brazil, signifies
Read More »
LDAP Integration with S/MIME Certificates
LDAP (Lightweight Directory Access Protocol) is an industry-standard protocol for accessing and managing directory information services. It is commonly used for storing and retrieving information
Read More »
Cybersecurity Roundup December 2023
Ten New Android Banking Trojans Emerge in 2023 Targeting Nearly 1,000 Apps In 2023, ten new Android banking trojan families emerged targeting 985 bank and
Read More »
Preparing for a Security Audit: Your SSL/TLS Checklist
While SSL and TLS certificates remain an integral component of website security, a comprehensive security audit encompasses much more in today’s threat landscape. With new
Read More »
What is a Certificate Authority (CA)?
Certificate authorities (CAs) are critical in securing online communications and identities. But what exactly does a CA do? And how do they establish trust online?
Read More »
Self-Signed Certificate Vulnerabilities
Self-signed certificates are an easy way to enable SSL/TLS encryption for your websites and services. But behind this convenience lies significant security risks that leave
Read More »
What is SSL/TLS: An In-Depth Guide
This guide provides an in-depth overview of SSL/TLS (Secure Sockets Layer and Transport Layer Security) – cryptographic protocols enabling secure internet communication. We will explain
Read More »