458 Results for:TLS
- Sort by:
How to manage and reduce secret sprawl
19 Oct 2022Secret sprawl plagues companies, making them vulnerable to data breaches. Discover what causes secret sprawl and how to better protect secrets. Read More
NCA ‘deliberately concealed’ information when it applied for EncroChat warrants, tribunal hears
23 Sep 2022Investigatory Powers Tribunal hears that the National Crime Agency made ‘serious and fundamental errors’ Read More
Understanding the importance of data encryption
02 Feb 2023Encryption is a foundational element of cybersecurity. Organizations should implement encryption to counter the ever-growing threat of data breaches. Read More
SSH2 vs. SSH1 and why SSH versions still matter
27 Jul 2022The Secure Shell protocol, SSH, was redesigned and released as SSH2 in 2006. While SSH1 lingers for legacy uses, find out how the protocols differ and why it's important. Read More
Symmetric vs. asymmetric encryption: What's the difference?
22 Jul 2022Explore the differences between symmetric vs. asymmetric encryption, including how they work and common algorithms, as well as their pros and cons. Read More
OpenSSL vulnerabilities ‘not as bad as feared’
02 Nov 2022As previously trailed, OpenSSL patched two buffer overflow vulnerabilities, neither of them as impactful as had been feared Read More
API series - NetFoundry: The tug of war between API access & security
07 Oct 2022This is a contributed piece for the Computer Weekly Developer Network’s API series written by Galeal Zino in his capacity as co-founder and CEO of NetFoundry – the company is the originator and ... Read More
Why you should plan to upgrade to Azure AD Connect v2 soon
06 Dec 2021Administrators who rely on an Azure AD Connect v1 version for hybrid identity with Office 365 should prepare for the impending retirement of several technologies in the utility. Read More
Trousseau turns up truss torque for Kubernetes
14 Feb 2022Protecting access to sensitive data in Kubernetes is complicated. Some would go far enough to say that the security layer in Kubernetes is not optimal. Named after the French for ‘truss’ or ‘turn ... Read More
New revelations from the Snowden archive surface
19 Sep 2023A decade after Snowden exposed NSA’s mass surveillance in cooperation with the British GCHQ, only about 1% of the documents have been published – but three major facts can finally be revealed thanks to a doctoral ... Read More