458 Results for:TLS

  • Sort by: 

Use a zero-trust model for container security in the cloud

By Kurt Marko 15 May 2020

Traditional firewalls just won't cut it when it comes to container security in the public cloud. Zero-trust models are a better approach, but they demand some careful upfront work. Read More

How concerned should I be about a padding oracle attack?

By Hanno Böck 25 Mar 2019

Padding oracle attacks have long been well-known and well-understood. Find out how they work and why using modern encryption protocols can reduce the risks. Read More

API series - Section: The why & how of distributing GraphQL

By Adrian Bridgwater 10 Nov 2022

This is a contributed piece for the Computer Weekly Developer Network written by Daniel Bartholomew, CTO at Section. Section is known for hosting and delivery of cloud-native workloads that are ... Read More

A look at smart energy security measures

By Laura Vegh 22 Jun 2022

IoT energy meters and sensors make buildings and power grids more efficient and cost-effective but require encryption, network security and access control for safe operation. Read More

10 top open source security testing tools

By Ed Moyle 08 Aug 2022

From Kali Linux to Mimikatz to Metasploit, learn about 10 open source penetration testing tools organizations can use to determine how secure their network is. Read More

NSA reports flaw in Windows cryptography core

By Michael Heller 15 Jan 2020

Microsoft patched a critical vulnerability in how Windows validates cryptographic certificates that could lead to dangerous attacks, according to experts, and was originally reported by the NSA. Read More

Where does IMAP security fall short, and how can it be fixed?

By Peter Loshin 27 Jun 2019

Legacy email protocols like IMAP are prime targets for hackers. Fix IMAP security with better configuration, more encryption and multifactor authentication mandates. Read More

Mobile app security best practices for 4 vulnerability types

By Matthew Grasberger 27 May 2021

Adequate mobile app security must assess various dimensions of software, including each OS's best practices, traffic and API calls, data storage and source code. Read More

How to evaluate CASB tools for multi-cloud deployments

By Ed Moyle 02 Dec 2019

When it comes to evaluating CASB tools, it's essential to be an informed customer. Identify your organization's usage and security goals to get the context you need before you buy. Read More

Microsoft fixes six zero-days in January Patch Tuesday update

By Alex Scroxton 12 Jan 2022

A larger than of late Patch Tuesday update from Microsoft comes as defenders continue to grapple with Log4Shell Read More