458 Results for:TLS

  • Sort by: 

How to manage and reduce secret sprawl

By Charles Kolodgy 19 Oct 2022

Secret sprawl plagues companies, making them vulnerable to data breaches. Discover what causes secret sprawl and how to better protect secrets. Read More

NCA ‘deliberately concealed’ information when it applied for EncroChat warrants, tribunal hears

By Bill Goodwin 23 Sep 2022

Investigatory Powers Tribunal hears that the National Crime Agency made ‘serious and fundamental errors’ Read More

Understanding the importance of data encryption

By Jack Poller 02 Feb 2023

Encryption is a foundational element of cybersecurity. Organizations should implement encryption to counter the ever-growing threat of data breaches. Read More

SSH2 vs. SSH1 and why SSH versions still matter

By Peter Loshin, Mike Chapple 27 Jul 2022

The Secure Shell protocol, SSH, was redesigned and released as SSH2 in 2006. While SSH1 lingers for legacy uses, find out how the protocols differ and why it's important. Read More

Symmetric vs. asymmetric encryption: What's the difference?

By Michael Cobb 22 Jul 2022

Explore the differences between symmetric vs. asymmetric encryption, including how they work and common algorithms, as well as their pros and cons. Read More

OpenSSL vulnerabilities ‘not as bad as feared’

By Alex Scroxton 02 Nov 2022

As previously trailed, OpenSSL patched two buffer overflow vulnerabilities, neither of them as impactful as had been feared Read More

API series - NetFoundry: The tug of war between API access & security

By Adrian Bridgwater 07 Oct 2022

This is a contributed piece for the Computer Weekly Developer Network’s API series written by Galeal Zino in his capacity as co-founder and CEO of NetFoundry – the company is the originator and ... Read More

Why you should plan to upgrade to Azure AD Connect v2 soon

By Reda Chouffani 06 Dec 2021

Administrators who rely on an Azure AD Connect v1 version for hybrid identity with Office 365 should prepare for the impending retirement of several technologies in the utility. Read More

Trousseau turns up truss torque for Kubernetes

By Adrian Bridgwater 14 Feb 2022

Protecting access to sensitive data in Kubernetes is complicated.  Some would go far enough to say that the security layer in Kubernetes is not optimal. Named after the French for ‘truss’ or ‘turn ... Read More

New revelations from the Snowden archive surface

19 Sep 2023

A decade after Snowden exposed NSA’s mass surveillance in cooperation with the British GCHQ, only about 1% of the documents have been published – but three major facts can finally be revealed thanks to a doctoral ... Read More