458 Results for:TLS

  • Sort by: 

Why the Bleichenbacher attack is still around

By Michael Cobb 01 Mar 2018

The Bleichenbacher attack got a new name after 20 years. Expert Michael Cobb reviews the ROBOT attack and discusses why it's still active this long after it emerged. Read More

The new standard for IoT security

By Mahmoud Abdelkader 28 Mar 2019

When adopting a wireless sensor network to accommodate IoT, it is critical to also adopt a proper IoT data security strategy. Very Good Security's Mahmoud Abdelkader explains what to look for. Read More

Most code-signing processes insecure, study shows

By Warwick Ashford 11 Jun 2019

The majority of organisations are failing to enforce security for code-signing processes, providing opportunities for cyber criminals, a survey reveals Read More

Using Microsoft Exchange certificates requires planning

By Nathan O'Bryan 22 Mar 2018

Exchange certificates typically require minimal management effort after they have been set up, and they offer a secure means of communication between different organizations. Read More

Secure configuration management tasks with a certificate authority

By Stephen J. Bigelow 10 Sep 2019

A CA server is a limited shield for the data that configuration management tools collect, but IT admins can use one for many tasks -- like to create custom certificates -- and boost security. Read More

Multiple Microsoft bugs being actively exploited

By Alex Scroxton 14 Jul 2021

Microsoft’s July Patch Tuesday update fixes 117 vulnerabilities, 13 rated as critical and four already being actively exploited Read More

Why cloud changes everything around network security

24 May 2021

Vishal Jain examines why the data center mindset doesn't work for network security when it comes to using the public cloud and how companies should think instead. Read More

NuoDB 4.0 beats drum for cloud-native cloud-agnosticism

By Adrian Bridgwater 31 Jul 2019

Distributed SQL database company NuoDB has reached its version 4.0 iteration... and aligned further to core open source cloud platform technologies. The new release expands cloud-native and ... Read More

10 enterprise database security best practices

By Ed Moyle, Mike Chapple 02 Aug 2022

Beyond protecting enterprise databases from vulnerabilities, it is critical to improve and review their security on a regular basis. Learn more with these database security best practices. Read More

Imperva breach update puts blame on exposed AWS API keys

By Michael Heller 14 Oct 2019

Imperva CTO Kunal Anand posted updated information regarding the recent breach affecting Cloud WAF customers and admitted poor security controls led to the compromise. Read More