02 May, 2023

Many websites have enabled the Transport Layer Security Protocol (a requirement of the CA/B forum) in order to provide their customers with trusted and secure communications with their internet service. Of those that do, many use Domain Validated (DV) certificates to meet basic browser requirements, without considering Organization Validation (OV) and Extended Validation (EV) certificates that offer the browser user the benefit of higher assurance in terms of trusting the web service they are accessing. It makes a lot of difference if an organization goes the extra mile to provide customers confidence in the authenticity of their web services rather than just ticking the box.
The CA/Browser Forum began in 2005 as part of an effort among certification authorities and browser software vendors to standardize cryptographic controls for web browsing. The purpose of these controls is to add security and trust to web browsing by securing data exchanges between the internet browser and website via an encrypted connection, as well as to provide the browser user with assurance regarding the identity of the web service being accessed.
The security protocol that provides this is known as Transport Layer Security (TLS), which is a newer and more secure version of the former Secure Socket Layer (SSL) protocol. The TLS protocol is enabled by TLS digital certificates that are produced by Certificate Authorities (CAs). These digital certificates and the CA that signed them are cryptographically linked to a Root Certificate Authority (RCA) certificate that has been embedded into the browser products’ Trusted Root CA list as a ‘Trust Anchor’.
The associated web browser vendors implement these controls in their products. Where an uncompliant website is accessed, the browsers provide ‘untrusted’ error messages to the browser user.
There are 3 types of TLS certificates that can be used by a website to enable the TLS protocol:
Whilst all 3 of them ensure the browser does not present the user with an untrusted message and enable the encrypted session between the browser and the website, there are differences in the level of trust assurance each provides to the browser user.
Domain Validation (DV) Certificates are by far the most commonly used type of TLS certificate. The reason for this is that they are the most economical and can sometimes even come at no cost at all. They ‘tick the box’ by ensuring the bare minimum trust requirements of the browsers are met. DV certificates only provide assurance that the website domain is registered and controlled by the requester, but that does not mean there is an association between the domain and the organization it represents (i.e. These certificates do not contain the organization name because the relationship between the requestor and organization is not validated in the DV process). Many phishing and smishing URLs leverage TLS to give users a false sense of security about website authenticity. Threat actors using these techniques are more likely to go for DV TLS certificates given the cost factor and the likelihood of the vetting process approving their application.
Organization Validation (OV) Certificates provide all the benefits of DV and more, however, they have an additional cost associated with more extensive efforts within the vetting process. They assure customers that the domain they are accessing is owned by your organization, so there is a level of credibility associated with your service.
Extended Validation (EV) Certificates provide the highest level of trust assurance, via more stringent validation processes, and are therefore the most expensive. Having the EV TLS certificate is the web's way to indicate to anyone who visits your site that you are who you say you are. It confirms that you're trustworthy and willing to take the necessary steps to prove it.
To summarize,
Author:Aaron Carolan
Caption - Cybercriminals are always on the lookout to steal critical information sent between users and web services. Read more on how you can add security to your website, ultimately building user confidence and improving your brand reputation.
05 May, 2026
Vishing Attacks on IT Help Desks: How attackers bypass MFA with a...
Read now20 April, 2026
Identity Security Fabric: Is your IAM strategy ready for emerging...
Read now17 April, 2026
Non-human identity governance: The silent threat in modern cloud ...
Read now08 April, 2026
Security Performance Measurement: From compliance to confidence –...
Read now07 April, 2026
Security Performance Measurement: From compliance to confidence –...
Read now07 April, 2026
Bridging the gap: Integrating secure code review into the DevSecOps
Read now02 April, 2026
Cyber in hybrid conflict: The new invisible frontline
Read now30 March, 2026
How to write threat models that engineers actually use for strong...
Read now27 March, 2026
Cybersecurity Documentation: Best practices for SOC, IR and secur...
Read now26 March, 2026
The Big Shift: Making cyber agentic AI (CA2) safer – Governance, ...
Read now10 March, 2026
vCISO vs. Advisory CISO: How to choose the right Trusted Cybersec...
Read now06 March, 2026
The Big Shift: Demystifying Cyber Agentic AI (CA2)
Read now25 February, 2026
Identity and Access Management in the age of AI and autonomous ag...
Read now05 February, 2026
From Reactive to Autonomous: The rise of Agentic AI in cybersecurity
Read now03 February, 2026
Risk prioritization in today’s evolving cyber threat landscape
Read now14 January, 2026
Cybersecurity in 2026: Why identity, AI, and trust will define th...
Read now21 November, 2025
Red Teaming vs. VAPT: Choosing the right test for stronger cyber ...
Read now13 November, 2025
Compliance isn’t security: The hidden risks of a checkbox approach
Read now29 October, 2025
GraphQL Abuse: The silent killer in API security
Read now22 October, 2025
Securing DevOps: A GRC perspective on agility, assurance and secu...
Read now08 October, 2025
How SOCaaS can power transformation and foster innovation in GCC
Read now26 September, 2025
Why is red teaming a must for OT systems
Read now19 September, 2025
UAE cybercrime statistics 2025: Key data and trends
Read now17 September, 2025
Cyber Risk Management: Qualitative vs. Quantitative Approaches
Read now10 September, 2025
Why AI-powered SOCs are the future of cyber defense
Read now03 September, 2025
How AI is transforming cybersecurity and threat detection
Read now29 August, 2025
AI vs Hackers: Who is winning the cybersecurity arms race
Read now28 August, 2025
Why every cybersecurity team needs document version control
Read now27 August, 2025
AI agents in cybersecurity: Your new virtual SOC team
Read now21 August, 2025
Securing Operational Technology: Challenges and best practices
Read now17 July, 2025
Red Teaming in cybersecurity: Why thinking like a hacker matters
Read now21 May, 2025
What is a SCIF? Inside the CPX Secure Compartmented Information F...
Read now21 April, 2025
Cybersecurity in the UAE: What CISOs must prioritize today
Read now18 March, 2025
The critical role of trusted advisors in OT cybersecurity
Read now14 February, 2025
AI Agents: The new arsenal CISOs need
Read now27 January, 2025
Make your AI work right: A framework for secure and ethical AI
Read now14 January, 2025
Revolutionizing SOC efficiency: The power of cyber-physical integ...
Read now
20 November, 2024
The Modern CISO Playbook: Top priorities for CISOs in 2025
Read now30 August, 2024
Ask the Right Questions to Get Data Privacy Compliance Right
Read now
29 December, 2023
Navigating Cyberspace in 2024: A Sneak Peek into the Top Security...
Read now
14 December, 2023
Top systems integration challenges every organization must prepar...
Read now
29 August, 2023
Help ! My Facebook has been hacked
Read now
20 July, 2023
Security Product Research in the Lab: A fair chance to prove your...
Read now
20 July, 2023
The Cyber Security Conundrum: Balancing Ego and Expertise
Read now
20 July, 2023
The Internet Never Forgets
Read now
20 July, 2023
Top Cloud Security Risks and How to Address Them
Read now
20 July, 2023
Why Continuous Education, Training and Awareness are Essential fo...
Read now
02 May, 2023
A 5-Star Partner: Priming Your IT and Security Services for Success.
Read now
02 May, 2023
AI and Cybersecurity: A Tale of Innovation and Protection
Read now
02 May, 2023
How to Select a Secure Cloud Model, One Size Does Not Fit All
Read now
02 May, 2023
Making Sense of Public Ratings in Product Selection Process
Read now
02 May, 2023
Privacy Compliance: A Four-Step Approach
Read nowCPX values your privacy and the security of your personal information. This Privacy Policy outlines how we use the information that we collect from you when you visit this website. Any personal information we collect from you during your use of the website will be used in accordance with this Privacy Policy.
4th floor, Z23
Mohamed Bin Zayed City
Abu Dhabi, United Arab Emirates
For immediate assistance, CALL 8002255279
©CPX 2026. All rights reserved. Privacy policy | Terms of use
Please share your details to download the report.