September 20, 2017
The native iOS 11 email app has a bug that won't let it send email for users of Outlook.com, Office 365 and Exchange 2016 on Windows Server 2016.
August 18, 2017
Bloggers examine WatchGuard firewall appliances, explore transparency as a vendor virtue and assess the role of 5G in future SD-WAN deployments.
April 28, 2017
News roundup: A cybersecurity executive order overdue, but 'close and nearby.' Plus, the USPTO says it will stop using HTTPS; a teenage hacker sentenced to prison; and more.
March 31, 2017
News roundup: HTTPS traffic has yet to surge, despite its security benefits, according to a report. Plus, the latest in the Apple extortion; a Mirai attack lasted 54 hours; and more.
HTTP Get Started
Bring yourself up to speed with our introductory content
'Swift' and 'automatic': key characteristics of effective incident response. But how to get from where your plan is to where it needs to be? This handbook has the answers. Continue Reading
As global cyberattacks have exploded in recent months, the speed of infection is causing damage, not only to targeted industries and nation states, but to corporate valuations. In June, FedEx warned that the Petya cyberattack, which disrupted operations at its TNT Express subsidiary, may have "material impact" on the company's 2017 financial performance. Merck & Co. Inc., another victim of the cyberattack, issued a similar warning. A Trojan that morphed into a worm, Petya -- sometimes called NotPetya -- brought increased attention to the lack of security fundamentals practiced at major companies.
The majority of these threats enter networks through malware delivered via the internet. However, as the growth of HTTPS deployment continues, some companies are increasingly using Transport Layer Security (TLS) interception by middleboxes to maintain visibility into TLS security and malicious software. Researchers from top universities and technology companies, including Google, Mozilla and Cloudflare, published an HTTPS interception study in April that offered startling statistics on TLS security.
In this issue of Information Security magazine, we look at how worms play a role in advanced persistent threats and the ongoing issues related to HTTPS inspection and TLS security.Continue Reading
MAPI over HTTP is the default transport protocol to connect clients to Microsoft Exchange and Exchange Online. Continue Reading
Evaluate HTTP Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Because of their familiarity with the scripting language, some Windows shops use PowerShell alongside Azure Functions. Here are some tips, and caveats, to note before you start. Continue Reading
Cleanly divided and straightforward applications are good candidates for a container-based deployment, whereas complex applications pose more challenges. Continue Reading
While using a miniservice approach may be considered an illegitimate shortcut, some believe it is still an acceptable form of microservices. We explain in this Q&A. Continue Reading
Learn to apply best practices and optimize your operations.
A recent patching issue with Flash drew attention to shortcomings with Adobe's HTTP security headers. Judith Myerson discusses the importance of HTTP header security. Continue Reading
I need a persistent cloud application deployment in which the Azure VMs' IP addresses remain the same after a restart or failure. Continue Reading
HEIST, a new HTTP/2 protocol exploit, can steal encrypted content from HTTPS traffic. Expert Michael Cobb explains how this attack works and how to stop it. Continue Reading
Problem Solve HTTP Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Cloud service providers can perform HTTPS inspection, despite warnings from US-CERT. Expert Ed Moyle looks at what this technique does and what the security implications are. Continue Reading
Should products intercept Transport Layer Security connections to gain visibility into network traffic? A new study by researchers and U.S.-CERT warn against it. Continue Reading
There are many barriers to improved web application performance, but using a data cache effectively can break down many of those performance barriers. Continue Reading