Reading Time: 1 minute
Recently, we reviewed a document of best practices in deploying SSL Certificates published by Qualys, a prominent security company. Their document had some very good advice. In particular, we agree whole heartedly with their recommendation that an SSL user should “obtain certificates from a reliable Certificate Authority”.
They went on to list criteria that you should use in determining if a CA should be considered reliable. We decided to evaluate ourselves to see how we stack up based on their standards. Not only do we pass the test, you might think that they had Comodo in mind when they defined the criteria!
START FREE TRIAL GET YOUR INSTANT SECURITY SCORECARD FOR FREE
- CA
- coingenius
- cryptocurrency wallets
- cryptoexchange
- cyber security
- cybercriminals
- Cybersecurity
- CyberSecurity Comodo
- department of homeland security
- digital wallets
- e-commerce
- firewall
- Kaspersky
- malware
- Mcafee
- NexBLOC
- plato
- plato ai
- Plato Data Intelligence
- Plato Game
- PlatoData
- platogaming
- SSL
- ssl certifcate
- Trust
- VPN
- website security
- zephyrnet
More from CyberSecurity Comodo
Comodo Newsletter – Making Sense of Endpoint Malware Protection Technology
Source Node: 1973854
Time Stamp: Aug 22, 2017
ITSM – The best cost effective solution for Better Service
Source Node: 1902794
Time Stamp: Feb 24, 2018
FireFox 35 Fixes Critical Security Flaws , Adds Chat Feature
Source Node: 2157323
Time Stamp: Jan 14, 2015
Marketing can be a very powerful influence on our ability to accept situations that are sub-optimal
Source Node: 1929342
Time Stamp: Nov 6, 2017
How to Remove the Dreaded Vosteran Browser Hi-Jacker – Comodo News and Internet Security Information
Source Node: 2155154
Time Stamp: Jan 19, 2015
Zero Day Vulnerability in Adobe Flash Player Threatens Web Users
Source Node: 2153041
Time Stamp: Jan 22, 2015
Comodo Cybersecurity Q1 2018 Global Malware Report: cybercriminals follow the money, cryptominers leap ahead of ransomware
Source Node: 1894685
Time Stamp: Apr 16, 2018