November 03, 2017
News roundup: Comodo and Symantec sales signal important changes in the certificate authority business. Plus, an Oracle vulnerability gets a CVSS score of 10.0, and more.
July 27, 2017
Karla Burnett of Stripe presented sobering results of phishing research from her company at Black Hat 2017, suggesting phishing training is ineffective against today's threats.
July 20, 2017
As the Symantec certificate authority scrambles to transition its certificate-issuance operations to a subordinate certificate authority, the CA industry sharpens its knives.
May 11, 2017
This week, bloggers look into next-gen firewalls as a legacy firewall technology and weigh in on Zentera's cloud management efforts and Cisco's debugging of the NX-OS.
SSL Get Started
Bring yourself up to speed with our introductory content
In the market to buy digital certificates? Learn exactly how digital certificates work, which features are key and how to evaluate the available options on the market. Continue Reading
An application delivery controller (ADC) sits between you and the web server farm to manage the traffic between you and any number of back-end servers. In other words, app delivery controllers control the delivery of the web application to you -- hence the name.
Older ADCs required custom ASICs, which raised costs, but processing power has advanced so that ADCs with sophisticated functionality can be implemented in software and run on cost-effective general-purpose processors. This allows today's app delivery controllers to be implemented not only as standalone hardware devices but quite effectively as virtual appliances as well or as a hosted service. In other words, more companies than ever can afford an ADC.
This Buyer's Guide explains key developments in app delivery controller technology and reviews the features ADCs can have. It serves as a manual for networking professionals and others involved in acquiring an app delivery controller for their particular company.Continue Reading
Application delivery controllers have advanced in ways that make ADCs more useful for a wider range of companies than ever before. This guide outlines what you need to know in order to buy the best application delivery controller for your company. Continue Reading
Evaluate SSL Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Google's use of HTTP Strict Transport Security aims to improve web browsing security. Expert Judith Myerson explains how HSTS can make the internet more secure. Continue Reading
Google's OSS-Fuzz is an open source vulnerability scanner. Expert Matthew Pascucci looks at how developers can take advantage of this tool and others like it. Continue Reading
VMware builds Harbor and Admiral components into vSphere 6.5 Integrated Containers in a bid to stand toe-to-toe with Docker's container strategy. Continue Reading
Learn to apply best practices and optimize your operations.
Running a private certificate authority can pose significant risks and challenges to meet baseline requirements. Michael Cobb explores what enterprises should know. Continue Reading
With a virtual IP template, you can control the way load balancing is handled in SCVMM for an individual workload. Follow these easy steps to create one. Continue Reading
By integrating WSUS with SCVMM and using these configuration settings, you can rest assured that your Hyper-V infrastructure will be kept up to date. Continue Reading
Problem Solve SSL Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
The Ticketbleed flaw in F5 Networks' BIG-IP appliances leaks uninitialized memory and SSL session identities. Expert Michael Cobb explains how enterprises can mitigate it. Continue Reading
The Heartbleed flaw still impacts almost 200,000 services connected to the internet. Expert Nick Lewis explains why these services remain unpatched and vulnerable. Continue Reading
HTTP public key pinning, a security mechanism to prevent fraudulent certificates, was not used by Firefox, and left it open to attack. Expert Michael Cobb explains how HPKP works. Continue Reading