458 Results for:TLS

  • Sort by: 

LiveAction software focuses on provisioning resources

By Eamon McCarthy Earls 16 Nov 2017

Bloggers look into LiveAction software aimed at provisioning resources, the threat posed by the cybersecurity skills shortage and using Linux for data center switches. Read More

Three IoT encryption alternatives for enterprises to consider

By Judith Myerson 10 May 2018

The use of cryptography alternatives for IoT devices grants users certain benefits and potential security challenges. Learn more about each alternative with expert Judith Myerson. Read More

HTTPS interception, middlebox models under fire

By Peter Loshin 22 Mar 2017

HTTPS interception in security products and services may be reducing security rather than improving it, according to US-CERT, which puts middleboxes in a precarious position. Read More

NSA warns VPN vulnerabilities exploited by nation-state hackers

By Rob Wright 08 Oct 2019

Nation-state hackers are exploiting previously disclosed vulnerabilities in VPNs from Pulse Secure, Palo Alto Networks and Fortinet, according to a security advisory from the NSA. Read More

Encryption adoption driven by new tech and compliance

By Warwick Ashford 28 Mar 2019

The adoption of encryption is at its highest level yet, driven by the need to protect data generated by new digital initiatives, but still less than half of organisations are applying it consistently across the ... Read More

Accelerate data migration with AWS DataSync

By Kurt Marko 15 Mar 2019

Dig into the details of AWS DataSync, such as deployment options and availability. Compare it to similar AWS services and see how it can fit into an organization's cloud strategy. Read More

Sectigo pushing enterprise channel message on the back of a rebrand

By Simon Quicke 17 Jan 2019

SSL player Sectigo has launched a partner programme with plans to drive enterprise revenue Read More

Clouds gather over Chinese providers – but is there a silver lining?

By Fleur Doidge 20 Dec 2021

With the geopolitical outlook chillier than for some time, Computer Weekly explores the future prospects for UK-China approaches to technology and business Read More

MIT: Energy-efficient chip improves IoT encryption, authentication

By Ben Cole 27 Mar 2018

MIT researchers have developed an energy-efficient, hard-wired chip that they say will benefit IoT encryption and ease authentication processes in the IoT environment. Read More

What made iOS apps handling sensitive data vulnerable to MitM attacks?

By Michael Cobb 12 Jul 2017

A researcher discovered 76 iOS apps containing sensitive user data that were vulnerable to man-in-the-middle attacks. Expert Michael Cobb explains how developers can prevent this. Read More