SSL.com Blog
The NIST Cybersecurity Framework: An In-depth Overview
The National Institute of Standards and Technology’s (NIST) Cybersecurity Framework provides organizations with a systematic approach to understanding, managing, and reducing cybersecurity risk, thereby improving their overall cybersecurity posture. The Framework, which is based on the five basic roles of Identify, Protect, Detect, Respond, and Recover, does not impose a
Read More »
SSL Support Team
September 21, 2023
Preparing Your Organization for the Quantum Revolution: A Guide to Implementing Post-Quantum Cryptography
Quantum computers will be potent and pose a massive threat to encrypting data as we know it. Here at SSL.com, we are on top of significant developments in internet security. Before quantum hacking goes mainstream, we advise organizations to switch to quantum-safe “post-quantum” cryptography. Understanding Post-Quantum Crypto Post-quantum cryptography refers
Read More »
SSL Support Team
September 21, 2023
A Guide to PKI Protection Using Hardware Security Modules (HSM)
PKI (Public Key Infrastructure) relies on public and private keys to encrypt data. Hardware Security Modules (HSMs) safeguard these keys in tamper-proof boxes. HSMs store and manage the keys, preventing theft or misuse. They’re vital for PKI security, enabling trusted online transactions and communications. This article explains why HSMs are
Read More »
SSL Support Team
September 6, 2023
SSL.com Legacy Cross-Signed Root Certificate Expiring on September 11, 2023
What is a cross-signed root certificate? A cross-signed root certificate is a digital certificate issued by one Certificate Authority (CA) that is used to establish trust in another CA’s root certificate. This mechanism is commonly used in the context of Public Key Infrastructure (PKI) to bridge trust between different CAs.
Read More »
SSL Support Team
September 4, 2023
Cybersecurity Roundup July 2023
Chinese Malware on U.S. Bases in Taiwan: A Sophisticated Cyberattack Chinese malware has reportedly been detected on the computer systems of U.S. military bases in Taiwan. The strategic and sophisticated nature of these attacks suggests they originate from Chinese nation-state actors. These cyber intrusions, aimed at disrupting U.S. military activities
Read More »
SSL Support Team
August 25, 2023
The importance of migrating to SHA2 for your Private PKI
The IT sector has seen a trend in recent years toward replacing less safe cryptographic algorithms like SHA-1 with more secure ones like SHA-2. This blog post will examine in detail why upgrading your Private PKI to SHA-2 is not only important but also crucial, with a focus on the
Read More »
SSL Support Team
August 24, 2023
Subscribe To SSL.Com’s Newsletter
Don’t miss new articles and updates from SSL.com