SSL Support Team
Explore why law firms must prioritize cybersecurity investments today. Learn about unique vulnerabilities, rising cyber threats, essential security measures, and the business case for protecting sensitive legal data.
Read More »
What is Common Name? Understanding a Key Component of Digital Certificates
Learn about Common Name (CN) in digital certificates, its role in SSL/TLS security, and best practices for implementation. Understand how CN works with modern SAN fields, certificate requirements, and future trends in digital certificate management.
Read More »
Subordinate CAs and Why You Might Need One
Learn about Subordinate Certificate Authorities (Sub-CAs), their crucial role in PKI infrastructure, key benefits for organizations, and implementation best practices for secure certificate management.
Read More »
Install an SSL Certificate on a Tomcat or Java-based Web Server
How to install an SSL Certificate on a Java-based Web Server.
Read More »
Understanding CAA Check Failures and How to Resolve Them
Overview Certification Authority Authorization (CAA) records allow domain owners to specify which Certificate Authorities (CAs) can issue TLS certificates for their domains. CAA mandates that
Read More »
OCSP Stapling: Secure and Efficient Certificate Validation
Learn how OCSP stapling enhances SSL/TLS certificate validation by improving performance, privacy, and reliability, and discover how to implement it on your server.
Read More »
How to Automate EV Code Signing With Signtool.exe or Certutil.exe Using eSigner CKA (Cloud Key Adapter)
eSigner CKA (Cloud Key Adapter) is a Windows based application that uses the CNG interface (KSP Key Service Provider) to allow tools such as certutil.exe
Read More »
How to Install SSL.com eSigner Cloud Key Adapter (CKA)
eSigner CKA (Cloud Key Adapter) is a Windows based application that uses the CNG interface (KSP Key Service Provider) to allow various tools to use
Read More »
Authenticating Users and IoT Devices with Mutual TLS
Learn how to implement mutual TLS (mTLS) authentication for securing user and IoT device connections. Includes step-by-step certificate setup, server configuration, client implementation, and troubleshooting guidelines.
Read More »
Pharming Explained: How to Prevent DNS-Based Cyber Attacks
Pharming is a sophisticated cyberattack that exploits DNS vulnerabilities to redirect users to fraudulent websites. Learn how to recognize, prevent, and respond to these DNS-based threats.
Read More »
What Is the ACME Protocol?
Learn about the ACME protocol – an automated method for managing SSL/TLS certificate lifecycles. Discover how it streamlines certificate issuance, renewal, and improves website security through standardized automation.
Read More »
SSL.com to Deprecate Domain Contact-Based Email Domain Control Validation on December 2, 2024
Starting December 2, 2024, the WHOIS-based email domain control validation (DCV) method to obtain SSL/TLS certificates will no longer be accepted by SSL.com. It has
Read More »
How to Digitally Sign .app Files using eSigner CKA
A .app file is essentially a macOS application bundle. It’s a directory that contains all the necessary files for a macOS application to run, such
Read More »
How to Digitally Sign a Hardware Lab Kit (HLK) file using eSigner CKA
Hardware Lab Kit is a tool to test and prepare a kernel mode driver for submission to Microsoft. Currently eSigner CKA also requires the HLKSigntool
Read More »
How to Digitally Sign VBA Macros using eSigner CKA
eSigner CKA (Cloud Key Adapter) is a Windows application leveraging the CNG interface (KSP Key Service Provider), enabling tools like certutil.exe and signtool.exe to access
Read More »
How to Digitally Sign vsix files using eSigner CKA
A .vsix file is a Visual Studio Extension Installer package used by Microsoft Visual Studio. It contains software that adds new functionality or extends existing
Read More »
Private vs Public PKI: Building an Effective Plan
Learn how to build an effective private or public PKI plan, incorporating trends like post-quantum cryptography, PKI automation, and industry-specific considerations.
Read More »
Digitally Sign a PDF on Adobe Acrobat Reader using eSigner CKA
Unlock seamless and secure digital document signing with the eSigner Cloud Key Adapter (CKA), an innovative Windows application designed to work effortlessly with leading platforms
Read More »
Add Digital Signatures to Microsoft Office 365 Documents using eSigner CKA
Experience seamless and secure document signing with the eSigner Cloud Key Adapter (CKA), a powerful Windows application designed to integrate effortlessly with Microsoft-based programs. eSigner
Read More »
How Simple Passwords and Employees Put Cybersecurity at Risk
Discover how simple passwords and employee negligence can jeopardize your organization’s cybersecurity, and learn practical steps to strengthen your defenses against cyber threats.
Read More »
Comparing ECDSA vs RSA: A Simple Guide
Compare ECDSA and RSA cryptographic algorithms: key features, security, performance, and use cases. Learn when to choose each for digital signatures and encryption.
Read More »
S/MIME Certificate Management with Microsoft Intune using SSL.com Azure Integration Tool
Introduction Microsoft Intune allows for the integration of imported PFX certificates, which are often used for S/MIME encryption in email profiles. Intune supports the import
Read More »
Avoid Common HTTPS Errors: A Simple Guide
Quick guide to fixing common HTTPS errors. Learn to identify and resolve SSL/TLS issues for secure browsing and website management.
Read More »
What is Elliptic Curve Cryptography (ECC)?
Elliptic Curve Cryptography explained: Efficient public-key encryption for modern cybersecurity, from web security to cryptocurrencies.
Read More »
What is a Cryptographic Protocol?
Discover cryptographic protocols—rules ensuring secure communication and data protection online, including SSL/TLS, SSH, and more.
Read More »