458 Results for:TLS
- Sort by:
NordVPN blames datacentre provider for server breach
22 Oct 2019VPN provider insists no user data was compromised in a March 2018 server breach, and says its datacentre provider failed to inform it of the issue Read More
Adopt data storage security standards to ensure compliance
25 Aug 2021Data storage security standards are vital to prepare for audit activities and ensure compliance. This tip examines standards that address data storage security. Read More
Email authentication: How SPF, DKIM and DMARC work together
19 Aug 2022Internet protocols for email authentication -- SPF, DKIM and DMARC -- coordinate defense against spammers, phishing and other spoofed email problems. Read More
PowerShell tutorials capture attention of admins in 2019
23 Dec 2019Interest in automation continues to trend upward for administrators of Windows systems, particularly when it involves PowerShell. Read More
Manage Jenkins vulnerabilities via Security Advisory page
11 Mar 2019The Jenkins Security Advisory maintains a list of vulnerable plugins and ways to fix issues that may otherwise hamper your environment. Keep a close eye on it for your well-being. Read More
Compare Google Cloud Run vs. App Engine for enterprise software
01 Feb 2022Google's Cloud Run and App Engine both aim to accelerate app development and simplify deployment. Developers will want to choose between the services on a case-by-case basis. Read More
Upstream Istio service mesh hones IT ops user experience
09 May 2022The Istio service mesh community has revealed further plans to simplify the project's notoriously difficult 'Day 2' management, which can't all be addressed by downstream vendors. Read More
How to mitigate an HTTP request smuggling vulnerability
31 Jul 2020Exploiting an HTTP request smuggling vulnerability can result in the inadvertent execution of unauthorized HTTP requests. Learn how to defend web environments from this attack. Read More
Risk & Repeat: Let's Encrypt certificates offer pros, cons
17 Jan 2018In this week's Risk & Repeat podcast, SearchSecurity editors discuss Let's Encrypt certificates and weigh the positives and negatives the free certificate authority provides. Read More
Kong tightens links between API gateway, service mesh
29 Sep 2021Kong adds support for Istio and Envoy integration with its API gateway to consolidate network management between traditional and cloud-native apps. Read More