Blog Blog

Cybersecurity Roundup August 2023

Google Chrome Introduces Safety Checks for Browser Extensions  Google Chrome is implementing a new feature to enhance user security by warning them about potentially malicious browser extensions. The feature will alert users if an installed extension has been removed from the Chrome Web Store, which is often a sign that
Read More »

The Essential Guide to SAN Certificates

SSL/TLS certificates securely enable HTTPS and other encrypted connections for websites and services. Typically, you need a separate certificate for each hostname or domain you want to protect. This can get expensive for large or complex sites. SAN certificates offer a convenient and cost-effective solution, securing multiple hostnames or domains
Read More »

The NIST Cybersecurity Framework: An In-depth Overview

The National Institute of Standards and Technology’s (NIST) Cybersecurity Framework provides organizations with a systematic approach to understanding, managing, and reducing cybersecurity risk, thereby improving their overall cybersecurity posture. The Framework, which is based on the five basic roles of Identify, Protect, Detect, Respond, and Recover, does not impose a
Read More »

Preparing Your Organization for the Quantum Revolution: A Guide to Implementing Post-Quantum Cryptography

Quantum computers will be potent and pose a massive threat to encrypting data as we know it. Here at, we are on top of significant developments in internet security. Before quantum hacking goes mainstream, we advise organizations to switch to quantum-safe “post-quantum” cryptography. Understanding Post-Quantum Crypto Post-quantum cryptography refers
Read More »

A Guide to PKI Protection Using Hardware Security Modules (HSM) 

PKI (Public Key Infrastructure) relies on public and private keys to encrypt data. Hardware Security Modules (HSMs) safeguard these keys in tamper-proof boxes. HSMs store and manage the keys, preventing theft or misuse. They’re vital for PKI security, enabling trusted online transactions and communications. This article explains why HSMs are
Read More »


Subscribe To SSL.Com’s Newsletter

What is SSL/TLS?

Play Video

Subscribe To SSL.Com’s Newsletter

Don’t miss new articles and updates from

We’d love your feedback

Take our survey and let us know your thoughts on your recent purchase.