SSL.com Blog
What Is Certificate Pinning?
What is Certificate Pinning? Certificate pinning is a security mechanism used in the context of authenticating client-server connections, particularly in the context of secure communication over HTTPS (Hypertext Transfer Protocol Secure) or other TLS (Transport Layer Security) protocols. Its primary purpose is to enhance the security of the connection by
Read More »
SSL Support Team
October 30, 2023
On-Premises vs. Cloud HSMs: A Comparison
Organizations rely on Hardware Security Modules (HSMs) to safeguard cryptographic keys and accelerate cryptographic operations for critical applications. HSMs come in two primary deployment models: on-premises HSM appliances installed in private data centers and cloud-based HSM services operated by cloud services providers like Azure and AWS. This article examines
Read More »
SSL Support Team
October 23, 2023
SSL/TLS Handshake: Ensuring Secure Online Interactions
Whenever we visit a website, make an online purchase, or check our email, data is transmitted back and forth between our devices and remote servers. This exchange of information over the internet raises an important question – how do we know our data is secure from prying eyes? The answer
Read More »
SSL Support Team
September 29, 2023
Best Practices on Enabling LTV Signatures for Document Signing Using Self-managed HSMs
SSL.com provides turn-key remote cloud signing services through our eSigner signing operations API which includes the storage and management of private keys. However, many users prefer to utilize their own HSM or cloud HSM service to store private keys used to sign documents. LTV signatures allow for verification without relying
Read More »
SSL Support Team
September 27, 2023
The NIST Cybersecurity Framework: An In-depth Overview
The National Institute of Standards and Technology’s (NIST) Cybersecurity Framework provides organizations with a systematic approach to understanding, managing, and reducing cybersecurity risk, thereby improving their overall cybersecurity posture. The Framework, which is based on the five basic roles of Identify, Protect, Detect, Respond, and Recover, does not impose a
Read More »
SSL Support Team
September 21, 2023
Preparing Your Organization for the Quantum Revolution: A Guide to Implementing Post-Quantum Cryptography
Quantum computers will be potent and pose a massive threat to encrypting data as we know it. Here at SSL.com, we are on top of significant developments in internet security. Before quantum hacking goes mainstream, we advise organizations to switch to quantum-safe “post-quantum” cryptography. Understanding Post-Quantum Crypto Post-quantum cryptography refers
Read More »
SSL Support Team
September 21, 2023
Subscribe To SSL.Com’s Newsletter
Don’t miss new articles and updates from SSL.com