458 Results for:TLS

  • Sort by: 

How SPF records prevent email spoofing, phishing and spam

By Peter Loshin 25 Aug 2022

Forged email has long been used by hackers to break into protected systems. Learn how the Sender Policy Framework protocol helps stop spoofing, phishing and other malicious mail. Read More

Machine identities for sale on dark web, business warned

By Warwick Ashford 07 Mar 2019

Academics and security professionals are warning businesses that certificates used to establish trust and privacy on the internet are being weaponised and sold to cyber criminals bundled with other services Read More

What does a VPN concentrator do?

By Terry Slattery 02 Oct 2020

As more employees work remotely and VPN use rises, VPN concentrators have become trendy. But what does a VPN concentrator do exactly, and how do you deploy one? Read More

What is Triple DES and why is it being disallowed?

By Michael Cobb 09 Jan 2023

Triple DES no longer provides the encryption strength it once did. Prepare now to transition away from its use to a more security alternative. Read More

Pick a load balancer: Azure Front Door vs. Application Gateway

By Chris Tozzi 05 Aug 2021

Every cloud infrastructure requires a solid network architecture and Azure has two load balancers that can improve network performance. Discover where each one will fit the best. Read More

IPsec vs. SSL VPN: Comparing speed, security risks and technology

By Peter Loshin 26 Jun 2019

IPsec VPNs and SSL VPNs both encrypt network data, but they do it differently. Learn about the differences and how to determine the right solution for your organization. Read More

Zscaler: Exposed servers, open ports jeopardizing enterprises

By Shaun Nichols 16 Jun 2021

Zscaler analyzed 1,500 networks and found administrators are leaving basic points of entry wide open for attackers as neglected servers are falling by the wayside. Read More

6 data observability open source tools to consider

By George Lawton 18 Nov 2022

Learn about six data observability open source options helping organizations pursue data science experiments that are more budget-friendly and flexible than commercial tools. Read More

How DKIM records reduce email spoofing, phishing and spam

By Peter Loshin 20 Sep 2022

Learn how implementing DomainKeys Identified Mail helps protect against phishing, spam and email forgery by digitally signing outgoing messages. Read More

Venafi buys cloud protection service Jetstack

By Alex Scroxton 14 May 2020

Jetstack specialises in open source machine identity protection software for Kubernetes and cloud native ecosystems Read More