458 Results for:TLS

  • Sort by: 

Why the security stack needs to move to the edge

By Aaron Tan 24 May 2021

Akamai’s chief technology officer Robert Blumofe makes the case for a decentralised security model to address cyber threats that are emanating from the network edge Read More

Facebook hack the work of spammers, not foreign adversary

By Madelyn Bacon 19 Oct 2018

News roundup: The Facebook hack was the work of spammers, according to The Wall Street Journal. Plus, 35 million voter records are for sale on the dark web, and more. Read More

Are AWS certificate authority services trustworthy?

By Dave Shackleford 23 May 2018

AWS now operates as its own CA. What are the potential risks of the new AWS certificate authority services? Expert Dave Shackleford outlines the pros and cons of this new setup. Read More

Mac malware makes debut in top 10 list

By Warwick Ashford 11 Dec 2018

Mac malware appears in the WatchGuard top 10 malware list for first time, and 6.8% of major websites still use an insecure SSL protocol, according to the firm’s latest internet security report Read More

Compare the features in the Windows Server 2022 editions

By Brien Posey 28 Jan 2022

Microsoft unveiled a Datacenter Azure edition to go with the traditional Standard and Datacenter editions. See what else is new with this server OS release in this breakdown. Read More

6 SaaS security best practices to protect applications

By Ed Moyle 12 Jan 2021

Use these SaaS security best practices to ensure your users' and organization's SaaS use stays as protected as the rest of your enterprise applications. Read More

What risks does the OpenFlow protocol vulnerability present?

By Judith Myerson 24 Aug 2018

Researchers found a vulnerability in OpenFlow that can cause problems. Learn how vendor-specific SDN controllers may cause these OpenFlow protocol vulnerabilities. Read More

Oracle WebLogic users get a bridge to Kubernetes deployment

By Beth Pariseau 03 Aug 2021

Java developers in Oracle shops can use the new Verrazzano container platform to deploy apps to Kubernetes without a ground-up rewrite. Read More

Explosion in fake data-stealing shopping sites

By Warwick Ashford 27 Sep 2018

Cyber attackers are ramping up efforts to steal personal data by setting up look-alike domains that pose a phishing risk to online shoppers, researchers warn Read More

Linux kernel utility could solve Kubernetes networking woes

By Beth Pariseau 21 May 2020

Linux kernel utility eBPF gets new life as a more effective means to scale Kubernetes networking than native Kubernetes tools, and in some cases, service mesh. Read More