Web Analytics

Blog

SSL.com Blog

Essential Ways to Secure Your SSH Configuration

A comprehensive guide to securing SSH configurations through 8 essential practices, including key-based authentication, root login disabling, encryption, updates, 2FA, logging, access controls, and key management. Ideal for system administrators and security professionals implementing SSH best practices.
Read More »

What is DNS over HTTPS (DoH)?

DNS over HTTPS (DoH) encrypts DNS queries using HTTPS, enhancing internet privacy and security by preventing ISPs and malicious actors from monitoring or manipulating your web browsing. Learn how it works, its benefits, and how to implement it across different browsers and systems.
Read More »

December 2024 Cybersecurity Roundup

US Treasury Breach by Chinese Hackers Exposes Unclassified Documents The US Treasury Department disclosed that Chinese state-sponsored hackers breached their systems in December 2024 by exploiting vulnerabilities in BeyondTrust’s remote tech support software, gaining access to “certain unclassified documents.” The attackers stole an authentication key to bypass system defenses and
Read More »

An Introduction to Certification Authority Authorization (CAA)

SSL.com’s in-depth look at Certification Authority Authorization (CAA) and how it can help protect your website, your business – and your online reputation.

Created by the Internet Engineering Task Force (IETF) and described in RFC 6844, CAA lets the owner of a domain name authorize designated and specific Certification Authorities (CAs) to issue SSL certificates for their domain name.

Read More »

Follow SSL.com

Subscribe To SSL.Com’s Newsletter

What is SSL/TLS?

Play Video

Subscribe To SSL.Com’s Newsletter

Don’t miss new articles and updates from SSL.com

We’d love your feedback

Take our survey and let us know your thoughts on your recent purchase.