458 Results for:TLS
- Sort by:
Buy ‘plug-n-play’ malware for the price of a pint of beer
21 Jul 2022Three-quarters of malwares and almost 90% of exploits retail on the dark web for about £8.40 or less, according to a report Read More
Roll out IoT device certificates to boost network security
19 Mar 2021Organizations don't just use digital certificates for websites and web apps anymore. IoT device certificates have become a significant part of any cybersecurity strategy. Read More
Sidecarless service mesh: Fad or the future?
28 Oct 2022Istio's experimental Ambient Mesh is gathering buzz with the promise of simpler operations, but Linkerd loyalists contend that the sidecar itself isn't the real problem. Read More
Researchers uncover vulnerabilities in APC Smart-UPS devices
08 Mar 2022Researchers with Armis found a trio of vulnerabilities in uninterruptible power supply (UPS) devices from APC that could be remotely exploited by threat actors. Read More
How to send secure email attachments
05 Aug 2020Sending sensitive information in attachments is inherently unsafe, and the main way to secure them -- encryption -- can be implemented inconsistently, negating security benefits. Read More
Does Anyone Trust Zero Trust?
06 Apr 2022Has there been a more over-used term within IT security over the past few years than “zero trust”? Answers in the virtual black box at the back of the virtual room (in the virtual universe). I ... Read More
Understand IT change management vs. configuration management
29 Mar 2021When examining change management vs. configuration management, it's easy to confuse them. These examples illustrate how they intertwine, but still address different areas. Read More
Attackers enlist cloud providers in large HTTPS DDoS hit
29 Apr 2022A recent large-scale DDoS incident shows how cyber criminals are switching up their tactics to conduct more sophisticated attacks Read More
NetUSB flaw could impact millions of routers
11 Jan 2022SentinelOne researcher Max Van Amerongen said the only way to fix the high-severity vulnerability is to update the router firmware, which can be a difficult process. Read More
Finding the balance between innovation and data security in healthcare
23 Jun 2022As the government launches its data strategy for health and social care, a fine line must be trodden between innovating through privacy-enhancing technologies, and retaining data security for patients Read More