458 Results for:TLS
- Sort by:
Android P security improves authentication trust and data privacy
10 May 2018Android P security features, which were previewed at Google I/O, include notable improvements for data privacy and encryption and preventing malicious apps from spying on users. Read More
Banking trojans roar back to prominence in May
15 Jun 2020Check Point sees an upswing in malicious activity around a number of classic banking trojan malware variants Read More
SANS Institute: DNS attacks gaining steam in 2019
13 Mar 2019At RSA Conference 2019, experts from the SANS Institute discuss the most dangerous attack techniques they've seen, including DNS manipulation and domain fronting. Read More
InCountry launches Data Residency-As-A-Service (DRaaS)
13 May 2019InCountry is aiming to position its technology as a benefit for developers dealing with the headache of data compliance. The InCountry application uses its own API to store and retrieve records in ... Read More
File system software startup Quobyte chases IT, developers
13 Oct 2020Quobyte tempts developers and app owners with a free version of its distributed parallel file system software, hoping they will convince their IT admins to buy fully supported editions. Read More
Breaking down the DROWN attack and SSLv2 vulnerability
21 Apr 2016A DROWN attack can occur through more than a third of all HTTPS connections. Expert Michael Cobb explains how DROWN enables man-in-the-middle attacks and mitigation steps to take. Read More
A damaging spring of internet worms and poor performance
01 Sep 2017Security is a hot topic for media outlets that report on stock markets as companies founder on corporate earnings. The financial fallout of global malware is a call to action. Read More
How lattice-based cryptography will improve encryption
07 Jun 2018As the prospect of quantum computing-based attacks grows, the need for stronger encryption increases. Expert Michael Cobb discusses lattice-based cryptography as an option. Read More
How layered security can help and hinder application security
31 May 2018The growth of technology includes the growth of layered security. Join expert Kevin Beaver as he explains the pros and cons of layered defenses for application security. Read More
Zscaler charts sharp increase in SSL threats like phishing, botnets
11 Mar 2019Threat actors are exploiting encryption protocols to deliver malicious content, according to Zscaler, which found a 400% increase in SSL-based phishing threats last year. Read More