458 Results for:TLS

  • Sort by: 

NordVPN blames datacentre provider for server breach

By Alex Scroxton 22 Oct 2019

VPN provider insists no user data was compromised in a March 2018 server breach, and says its datacentre provider failed to inform it of the issue Read More

Adopt data storage security standards to ensure compliance

By Paul Kirvan 25 Aug 2021

Data storage security standards are vital to prepare for audit activities and ensure compliance. This tip examines standards that address data storage security. Read More

Email authentication: How SPF, DKIM and DMARC work together

By Peter Loshin 19 Aug 2022

Internet protocols for email authentication -- SPF, DKIM and DMARC -- coordinate defense against spammers, phishing and other spoofed email problems. Read More

PowerShell tutorials capture attention of admins in 2019

By Tom Walat 23 Dec 2019

Interest in automation continues to trend upward for administrators of Windows systems, particularly when it involves PowerShell. Read More

Manage Jenkins vulnerabilities via Security Advisory page

By Judith Myerson 11 Mar 2019

The Jenkins Security Advisory maintains a list of vulnerable plugins and ways to fix issues that may otherwise hamper your environment. Keep a close eye on it for your well-being. Read More

Compare Google Cloud Run vs. App Engine for enterprise software

By Kurt Marko 01 Feb 2022

Google's Cloud Run and App Engine both aim to accelerate app development and simplify deployment. Developers will want to choose between the services on a case-by-case basis. Read More

Upstream Istio service mesh hones IT ops user experience

By Beth Pariseau 09 May 2022

The Istio service mesh community has revealed further plans to simplify the project's notoriously difficult 'Day 2' management, which can't all be addressed by downstream vendors. Read More

How to mitigate an HTTP request smuggling vulnerability

By Mike Chapple 31 Jul 2020

Exploiting an HTTP request smuggling vulnerability can result in the inadvertent execution of unauthorized HTTP requests. Learn how to defend web environments from this attack. Read More

Risk & Repeat: Let's Encrypt certificates offer pros, cons

By Rob Wright 17 Jan 2018

In this week's Risk & Repeat podcast, SearchSecurity editors discuss Let's Encrypt certificates and weigh the positives and negatives the free certificate authority provides. Read More

Kong tightens links between API gateway, service mesh

By Beth Pariseau 29 Sep 2021

Kong adds support for Istio and Envoy integration with its API gateway to consolidate network management between traditional and cloud-native apps. Read More