Web Analytics

Blog

SSL.com Blog

Multi-Perspective Issuance Corroboration (MPIC) Arrives

On March 15, 2025, SSL.com will implement an initial deployment of MPIC. This update is in support of the requirements defined in Ballot SC-067 v3 of the CA/Browser Forum’s Server Certificate Working Group (SC-067). The goal of this new requirement is to enhance the security and trustworthiness of digital certificates
Read More »

What is HTTPS?

Discover how HTTPS secures online communications through encryption, authentication, and integrity checks, ensuring a safe browsing experience.
Read More »

Cybersecurity Essentials for Engineering Firms: Protecting Innovation and Data

Engineering firms face increasingly complex cybersecurity threats as supply chains become more interwoven and adversaries grow more sophisticated. Safeguarding sensitive data such as design schematics, research, and customer information requires robust digital identity and trust services. Why Engineering Companies Are Targeted Recent Attack Vectors and Statistics Engineering companies are prime
Read More »

Essential Ways to Secure Your SSH Configuration

A comprehensive guide to securing SSH configurations through 8 essential practices, including key-based authentication, root login disabling, encryption, updates, 2FA, logging, access controls, and key management. Ideal for system administrators and security professionals implementing SSH best practices.
Read More »

What is DNS over HTTPS (DoH)?

DNS over HTTPS (DoH) encrypts DNS queries using HTTPS, enhancing internet privacy and security by preventing ISPs and malicious actors from monitoring or manipulating your web browsing. Learn how it works, its benefits, and how to implement it across different browsers and systems.
Read More »

December 2024 Cybersecurity Roundup

US Treasury Breach by Chinese Hackers Exposes Unclassified Documents The US Treasury Department disclosed that Chinese state-sponsored hackers breached their systems in December 2024 by exploiting vulnerabilities in BeyondTrust’s remote tech support software, gaining access to “certain unclassified documents.” The attackers stole an authentication key to bypass system defenses and
Read More »

Follow SSL.com

Subscribe To SSL.Com’s Newsletter

What is SSL/TLS?

Play Video

Subscribe To SSL.Com’s Newsletter

Don’t miss new articles and updates from SSL.com

We’d love your feedback

Take our survey and let us know your thoughts on your recent purchase.