Search Results for: protocol – Page 3
Tax Time Updates: IRS Plans for Fully Digital Processing by 2025 The IRS is set to digitize all taxpayer documents by 2025, with the
Read More »
Certificate Authority Security Best Practices Guide for Branded Resellers: Comprehensive Security Measures
Introduction As a leading Certificate Authority (CA) and a trust services company, we prioritize the security and trustworthiness of our digital certificates and our identity
Read More »
SSL/TLS Handshake: Ensuring Secure Online Interactions
Whenever we visit a website, make an online purchase, or check our email, data is transmitted back and forth between our devices and remote servers.
Read More »
Best Practices on Enabling LTV Signatures for Document Signing Using Self-managed HSMs
SSL.com provides turn-key remote cloud signing services through our eSigner signing operations API which includes the storage and management of private keys. However, many users
Read More »
Cybersecurity Roundup August 2023
Google Chrome Introduces Safety Checks for Browser Extensions Google Chrome is implementing a new feature to enhance user security by warning them about potentially malicious
Read More »
Preparing Your Organization for the Quantum Revolution: A Guide to Implementing Post-Quantum Cryptography
Quantum computers will be potent and pose a massive threat to encrypting data as we know it. Here at SSL.com, we are on top of
Read More »
SSL/TLS Best Practices for 2023
An overview of current best practices to keep in mind when setting up SSL/TLS for your website, focusing on both security and performance.
Read More »
A Guide to PKI Protection Using Hardware Security Modules (HSM)
PKI (Public Key Infrastructure) relies on public and private keys to encrypt data. Hardware Security Modules (HSMs) safeguard these keys in tamper-proof boxes. HSMs store
Read More »
Cybersecurity Roundup July 2023
Chinese Malware on U.S. Bases in Taiwan: A Sophisticated Cyberattack Chinese malware has reportedly been detected on the computer systems of U.S. military bases in
Read More »
A guide to S/MIME Email Signing and Encryption
Email continues to be the primary means of business communication and growing even with the ascendance of other popular productivity messengers. The security risks affecting
Read More »
Job Listing: PKI Administrator
PKI Administrator Are you interested in helping shape the security of the Internet we all depend on? Are you interested in learning about or contributing
Read More »
Cybersecurity Roundup November 2022
Hackers Are Targeting United States Port Facilities with Malicious Typosquatting Websites According to the US Coast Guard Cyber Command, there has been an increase in targeted typosquatting attacks
Read More »
Cybersecurity Roundup October 2022
Hackers Successfully Targeted Google Translate as an Entry Point for a Major Attack: Phishing Was The Method of Penetration In an unprecedented and never before
Read More »
Cybersecurity Roundup July 2022
Machine Identities Are Critical for Cybersecurity In today’s connected world, robots, intelligent machines, and various automated devices outnumber humans using the Internet. While multiple layers
Read More »
Domain Name SSL/TLS Pre-Validation
How to pre-validate a domain name in your SSL.com customer portal. Methods covered are email challenge, HTTP file lookup, and CNAME CSR hash.
Read More »
May 2022 Cybersecurity Roundup
A lot of newsworthy cybersecurity events have occurred from the start up until the end of May. But before we discuss those, we will open
Read More »
Support for IPv6
SSL.com can issue Domain Validated (DV) and Organization Validated (OV) digital certificates to public IPv6 addresses. Internet Protocol version 6 (IPv6) has similar functions to
Read More »
PKI and Digital Certificates for Government
An overview of PKI applications and options for Information and Communication Technologies (ICT) Authorities and government-licensed CAs.
Read More »
Install SSL certificate on AWS Elastic Beanstalk / Load Balancer
This how-to will guide you through the process of installing a TLS/SSL certificate to your AWS Elastic Beanstalk environment so that you can encrypt data
Read More »
Cybersecurity Roundup for January 2022
This month’s roundup discusses two cases hinting at likely trends that government agencies will face when it comes to cyberattacks. As a company that aims
Read More »
Delegated Credentials for TLS
Terminating a TLS connection requires using a certificate’s private key. As a result, the private key needs to be stored at every single server utilized
Read More »
Securing the Internet of Things (IoT) with SSL/TLS
Read about the security issues faced by Internet of Things (IoT) providers, and how SSL/TLS certificates from SSL.com can be used to secure IoT devices.
Read More »
Business Email Compromise and S/MIME Certificates
There are a variety of scams in which attackers hack into a company’s emailing systems or create deceiving email templates in order to convince employees
Read More »
What is HTTPS?
HTTPS (Hypertext Transfer Protocol Secure) is a secure version of the HTTP protocol that uses the SSL/TLS protocol to encrypt data sent between a web browser and a website.
Read More »