458 Results for:TLS
- Sort by:
LiveAction software focuses on provisioning resources
16 Nov 2017Bloggers look into LiveAction software aimed at provisioning resources, the threat posed by the cybersecurity skills shortage and using Linux for data center switches. Read More
Three IoT encryption alternatives for enterprises to consider
10 May 2018The use of cryptography alternatives for IoT devices grants users certain benefits and potential security challenges. Learn more about each alternative with expert Judith Myerson. Read More
HTTPS interception, middlebox models under fire
22 Mar 2017HTTPS interception in security products and services may be reducing security rather than improving it, according to US-CERT, which puts middleboxes in a precarious position. Read More
NSA warns VPN vulnerabilities exploited by nation-state hackers
08 Oct 2019Nation-state hackers are exploiting previously disclosed vulnerabilities in VPNs from Pulse Secure, Palo Alto Networks and Fortinet, according to a security advisory from the NSA. Read More
Encryption adoption driven by new tech and compliance
28 Mar 2019The adoption of encryption is at its highest level yet, driven by the need to protect data generated by new digital initiatives, but still less than half of organisations are applying it consistently across the ... Read More
Accelerate data migration with AWS DataSync
15 Mar 2019Dig into the details of AWS DataSync, such as deployment options and availability. Compare it to similar AWS services and see how it can fit into an organization's cloud strategy. Read More
Sectigo pushing enterprise channel message on the back of a rebrand
17 Jan 2019SSL player Sectigo has launched a partner programme with plans to drive enterprise revenue Read More
Clouds gather over Chinese providers – but is there a silver lining?
20 Dec 2021With the geopolitical outlook chillier than for some time, Computer Weekly explores the future prospects for UK-China approaches to technology and business Read More
MIT: Energy-efficient chip improves IoT encryption, authentication
27 Mar 2018MIT researchers have developed an energy-efficient, hard-wired chip that they say will benefit IoT encryption and ease authentication processes in the IoT environment. Read More
What made iOS apps handling sensitive data vulnerable to MitM attacks?
12 Jul 2017A researcher discovered 76 iOS apps containing sensitive user data that were vulnerable to man-in-the-middle attacks. Expert Michael Cobb explains how developers can prevent this. Read More