SSL Support Team
SSL/TLS certificates securely enable HTTPS and other encrypted connections for websites and services. Typically, you need a separate certificate for each hostname or domain you
Read More »
The NIST Cybersecurity Framework: An In-depth Overview
The National Institute of Standards and Technology’s (NIST) Cybersecurity Framework provides organizations with a systematic approach to understanding, managing, and reducing cybersecurity risk, thereby improving
Read More »
Preparing Your Organization for the Quantum Revolution: A Guide to Implementing Post-Quantum Cryptography
Quantum computers will be potent and pose a massive threat to encrypting data as we know it. Here at SSL.com, we are on top of
Read More »
A Guide to PKI Protection Using Hardware Security Modules (HSM)
PKI (Public Key Infrastructure) relies on public and private keys to encrypt data. Hardware Security Modules (HSMs) safeguard these keys in tamper-proof boxes. HSMs store
Read More »
SSL.com Legacy Cross-Signed Root Certificate Expiring on September 11, 2023
What is a cross-signed root certificate? A cross-signed root certificate is a digital certificate issued by one Certificate Authority (CA) that is used to establish
Read More »
Cybersecurity Roundup July 2023
Chinese Malware on U.S. Bases in Taiwan: A Sophisticated Cyberattack Chinese malware has reportedly been detected on the computer systems of U.S. military bases in
Read More »
The importance of migrating to SHA2 for your Private PKI
The IT sector has seen a trend in recent years toward replacing less safe cryptographic algorithms like SHA-1 with more secure ones like SHA-2. This
Read More »
Cybersecurity Roundup June 2023
Massive Data Breach Hits California’s CalPERS and CalSTRS: Personal Information of 769,000 Retirees Compromised Hackers have compromised the personal information of roughly 769,000 retirees and
Read More »
Validation Process for Document Signing, Code Signing, and EV Code Signing Certificates
This how-to will walk you through the process of buying and submitting required documents for all SSL.com Document Signing certificates, as well as IV and
Read More »
Validating by CSR hash for cpanel
This how-to will walk you through validating a certificate signing request (CSR) in cPanel. In the validation page, select the CSR Hash validation method: either
Read More »
Ordering Process for Code and Document Signing Certificates
Both code signing and document signing certificates have similar options when it comes to storage of the private keys and options for signing. All code
Read More »
Bulk Enrollment of Personal ID+Organization S/MIME Certificates
SSL.com provides bulk ordering and enrollment of Personal ID+Organization S/MIME certificates (also known as IV+OV S/MIME), through our bulk order tool. This guide will walk you
Read More »
Cybersecurity Roundup May 2023
Critical Lessons from the MCNA Cyberattack: A Tale of Nine Million Breached Records The recent cyberattack on Managed Care of North America (MCNA), one of
Read More »
How to Use Pre-Signing Malware Scan with SSL.com eSigner
What is SSL.com Malware Scan? Malware Scan is a new service offered by SSL.com to software developers utilizing code signing certificates to assure that code
Read More »
How to Apply Digital Signatures to PDF Documents using Adobe Acrobat Sign with eSigner Integration
This guide demonstrates how to integrate SSL.com eSigner remote cloud signing service with Adobe Acrobat Sign to digitally sign an electronic document such as PDF. There
Read More »
How to Request Digital Signatures from Multiple Recipients using Adobe Acrobat Sign with eSigner Integration
Adobe Acrobat Sign enables the user to send PDFs and request digital signatures from multiple recipients. Organizations can use this guide to integrate SSL.com eSigner
Read More »
Cybersecurity News Roundup March 2023
Twitter Removes Source Code Leaked on GitHub By Suspected Former Employee Image above by Markus Spiske from Pixabay. Twitter has removed a source code used
Read More »
Install SSL.com CA Root Certificates
CA Root Certificates, CA-bundle, Intermediate Files
Read More »
Cybersecurity News Roundup February 2023
Chinese Cybercriminals Obtain Thousands of Texans’ Driver’s Licenses Image above by Gerd Altmann from Pixabay. The Texas Department of Public Safety announced on February 27
Read More »
Enterprise PKI (EPKI) Agreement Setup
What is EPKI? An Enterprise PKI (EPKI) Agreement allows an authorized representative to assume responsibility for retaining and validating identity evidence of employees or contractors
Read More »
Cybersecurity News Roundup January 2023
PayPal Accounts Breached Due to Password Recycling On January 19, 2023, Paypal sent out data breach notifications and informed nearly 35,000 of their users that
Read More »
How to Enable Two-Factor (2FA) Authentication for your SSL.com Account
This is a guide on how to enable or disable Two-Factor (2FA) Authentication for your SSL.com account. 2FA is a critical digital security measure to
Read More »
How to enable OTP SMS Two-Factor Authentication for eSigner Code or Document Cloud Signing
This is a guide on how enroll an SSL.com document signing or code signing certificate to use the One Time Password (OTP,) Short Message Service
Read More »
Manual Configure Trust in Adobe Acrobat
This is a guide on how to manually configure trust of a test document signing certificate in Adobe Acrobat. If you are using a test
Read More »