Search Results for: protocol – Page 4
July’s Roundup covers MS Edge security, mixed content in Chrome 85, 398-day certs in Chrome and Firefox, and TLS 1.0 and 1.1 deprecation in MS Office.
Read More »
FAQ: Digital Certificate Revocation
FAQ covering common methods for communicating information about digital certificate revocation: CRL, OCSP, OCSP Stapling and Must-Staple, and CRLite.
Read More »
What is a Digital Certificate?
A digital certificate is a type of file used to associate cryptographic key pairs with identities such as websites, individuals, or organizations.
Read More »
April 2020 Security Roundup
April’s roundup covers TLS 1.0 and 1.1 in Microsoft’s browsers, HTTPS-only mode and client certificates in Firefox, and Zoom alternative Jitsi.
Read More »
X.509 Certificates, PKI, and Online Voting in Elections
With an election looming in November, many are wondering how Americans will vote, given the current circumstances. X.509 certs may provide an answer.
Read More »
Stay Safe While Working at Home
Tips for keeping yourself and your sensitive information safe while working at home during the coronavirus/COVID 19 pandemic.
Read More »
March 2020 Security Roundup
March’s roundup includes information on staying safe online during the COVID-19 pandemic, changes to Google Chrome’s release schedule, and CRLite.
Read More »
Protect Yourself From Phishing
With so many people working from home, phishing is now a bigger problem than ever. Here’s how to spot phishing emails and websites and defend against them.
Read More »
SSL/TLS Automation for the Internet of Things (IoT)
IoT and IIoT manufacturers can work with SSL.com to securely automate the issuance and renewal of publicly trusted SSL/TLS certificates for their devices.
Read More »
February 2020 Security Roundup
February’s roundup covers shorter-lived certificates in Apple Safari, DoH in Firefox, the decline of TLS 1.0 and 1.1, and mixed content blocking in Chrome.
Read More »
SSL/TLS Automation for the IoT with ACME
With a custom, ACME-enabled issuing CA, IoT and IIoT vendors can easily manage and automate SSL/TLS certificate lifecycles on ACME-capable devices.
Read More »
Long-Term Validation (LTV) of PDF Digital Signatures in Adobe Acrobat
How to enable long-term validation (LTV) of digital signatures in Adobe Acrobat and Acrobat Reader
Read More »
What is the Value of Certificate Authorities?
All about what publicly trusted certificate authorities (CAs) do and how hard it is to be one.
Read More »
Business Identity Certificate with YubiKey
SSL.com’s Business Identity document signing, client authentication, and email certificates are delivered on YubiKey FIPS USB tokens.
Read More »
November 2019 Security Roundup
November’s Security Roundup features TPM-FAIL, Delegated Credentials for TLS, domain registrar breaches, and the IPv4 address shortage.
Read More »
What is Public-Key Cryptography?
Public-key cryptography, also known as asymmetric cryptography, is a system that uses pairs of public and private keys for encryption and authentication.
Read More »
October 2019 Security Roundup
October’s roundup covers mixed content in Chrome, security flaws in Pixel 4 and sudo, the secureness of Firefox, and quantum computing advances at Google.
Read More »
September 2019 Security Roundup
September’s roundup features a CA/B Forum vote on reducing certificate lifetimes, DoH in Firefox and Chrome, Cloudflare’s WARP service, and more!
Read More »
What Is an X.509 Certificate?
X.509 is a standard format for public key certificates. Each X.509 certificate includes a public key, identifying information, and a digital signature.
Read More »
What is DNS over HTTPS (DoH)?
DNS over HTTPS (DoH) uses the HTTPS protocol for sending and retrieving encrypted DNS queries and responses.
Read More »
What is HTTP Strict Transport Security (HSTS)?
HTTP Strict Transport Security (HSTS) is a web security policy mechanism designed to protect HTTPS websites against downgrade attacks and cookie hijacking.
Read More »
Internet of Things (IoT) Solutions
The Internet of Things (IoT) is growing every year, and SSL.com has everything needed to help manufacturers issue and manage certificates.
Read More »
SSL.com’s SWS API – Introduction
Learn how to automate certificate-related operations, such as issuing or revoking certificates, with SSL.com’s powerful SWS API.
Read More »
Custom-Branded Issuing CA
With a custom-branded issuing CA, your company can issue publicly-trusted certificates in its own name without investing in PKI infrastructure and staff.
Read More »
SNI: Virtual Hosting for HTTPS
This article discusses the various technologies for hosting multiple HTTPS websites on the same web server, with a focus on Server Name Indication (SNI).
Read More »