Search Results for: protocol
SSL.com offers the ACME protocol for automated SSL/TLS certificate management, and as an Internet of Things (IoT) automation solution.
Read More »
What Is the ACME Protocol?
Automated Certificate Management Environment (ACME) is a standard protocol for automated management of X.509 certificates.
Read More »
What is a “Cryptographic Protocol?”
A cryptographic protocol is designed to allow secure communication under a given set of circumstances. Here’s a closer look from SSL.com.
Read More »
S/MIME Installation for Outlook Android and iOS
Requirements for S/MIME Setup To ensure optimal security in Exchange Online, it’s crucial to configure S/MIME according to the guidelines specified in the ‘Configure S/MIME
Read More »
Cybersecurity Roundup March 2024
AT&T Confirms Massive Data Breach Impacting 73 Million Customers, Including Compromised Passcodes After initially denying the authenticity of a leaked dataset containing sensitive information of
Read More »
SSL Certificates and SEO: How to Optimize for Search Engine Visibility
Search engine optimization is a moving target – Google’s algorithms change constantly. However, one constant for boosting your SEO is adopting HTTPS and SSL certificates
Read More »
Quantum Proofing Next Generation PKI and Digital Certificates
Even in 2016, articles about quantum computers created uncertainties surrounding data security, in the case that sufficiently powerful quantum computers could be built. This article
Read More »
The Essential Guide to S/MIME for Secure Email Communications
Despite the rise of messaging services, email continues to be the primary channel for business communication. Not only is email use growing, security breaches through
Read More »
Cybersecurity Roundup January 2024
Coyote Trojan Targets Banking Apps with Advanced Evasion Techniques Kaspersky’s discovery of the Coyote banking Trojan, targeting 61 online banking apps mainly in Brazil, signifies
Read More »
LDAP Integration with S/MIME Certificates
LDAP (Lightweight Directory Access Protocol) is an industry-standard protocol for accessing and managing directory information services. It is commonly used for storing and retrieving information
Read More »
Cybersecurity Roundup December 2023
Ten New Android Banking Trojans Emerge in 2023 Targeting Nearly 1,000 Apps In 2023, ten new Android banking trojan families emerged targeting 985 bank and
Read More »
Preparing for a Security Audit: Your SSL/TLS Checklist
While SSL and TLS certificates remain an integral component of website security, a comprehensive security audit encompasses much more in today’s threat landscape. With new
Read More »
What is a Certificate Authority (CA)?
Certificate authorities (CAs) are critical in securing online communications and identities. But what exactly does a CA do? And how do they establish trust online?
Read More »
Self-Signed Certificate Vulnerabilities
Self-signed certificates are an easy way to enable SSL/TLS encryption for your websites and services. But behind this convenience lies significant security risks that leave
Read More »
What is SSL/TLS: An In-Depth Guide
This guide provides an in-depth overview of SSL/TLS (Secure Sockets Layer and Transport Layer Security) – cryptographic protocols enabling secure internet communication. We will explain
Read More »
What Is Certificate Pinning?
What is Certificate Pinning? Certificate pinning is a security mechanism used in the context of authenticating client-server connections, particularly in the context of secure communication
Read More »
Cybersecurity Roundup September 2023
Tax Time Updates: IRS Plans for Fully Digital Processing by 2025 The IRS is set to digitize all taxpayer documents by 2025, with the
Read More »
Certificate Authority Security Best Practices Guide for Branded Resellers: Comprehensive Security Measures
Introduction As a leading Certificate Authority (CA) and a trust services company, we prioritize the security and trustworthiness of our digital certificates and our identity
Read More »
SSL/TLS Handshake: Ensuring Secure Online Interactions
Whenever we visit a website, make an online purchase, or check our email, data is transmitted back and forth between our devices and remote servers.
Read More »
Best Practices on Enabling LTV Signatures for Document Signing Using Self-managed HSMs
SSL.com provides turn-key remote cloud signing services through our eSigner signing operations API which includes the storage and management of private keys. However, many users
Read More »
Cybersecurity Roundup August 2023
Google Chrome Introduces Safety Checks for Browser Extensions Google Chrome is implementing a new feature to enhance user security by warning them about potentially malicious
Read More »
Preparing Your Organization for the Quantum Revolution: A Guide to Implementing Post-Quantum Cryptography
Quantum computers will be potent and pose a massive threat to encrypting data as we know it. Here at SSL.com, we are on top of
Read More »
SSL/TLS Best Practices for 2023
An overview of current best practices to keep in mind when setting up SSL/TLS for your website, focusing on both security and performance.
Read More »
A Guide to PKI Protection Using Hardware Security Modules (HSM)
PKI (Public Key Infrastructure) relies on public and private keys to encrypt data. Hardware Security Modules (HSMs) safeguard these keys in tamper-proof boxes. HSMs store
Read More »
Cybersecurity Roundup July 2023
Chinese Malware on U.S. Bases in Taiwan: A Sophisticated Cyberattack Chinese malware has reportedly been detected on the computer systems of U.S. military bases in
Read More »