458 Results for:TLS
- Sort by:
BlackBerry Messenger to shut down, paid version available
22 Apr 2019The original encrypted BBM app will no longer be available as of May 31 as BlackBerry and Emtek go their separate ways, though the subscription enterprise version is now available. Read More
Managing VPN bandwidth requirements, speed and overhead
10 Aug 2020Companies are relying on IPsec VPNs to connect their remote workers. But determining how much VPN bandwidth you need is just one consideration; VPN overhead is another. Read More
Implementing Dmarc a top priority for UK
11 Jun 2019Basic email security should be a top priority for UK firms, followed by reducing third-party web exposure and monitoring data flows leaving the enterprise, a Rapid7 study reveals Read More
Embedded application security: Inside OWASP's best practices
15 Feb 2018OWASP released a draft of new guidelines for creating secure code within embedded software. Expert Judith Myerson discusses best practices, pitfalls to avoid and auditing tools. Read More
How to prevent network eavesdropping attacks
19 Jun 2020One of the biggest challenges of network eavesdropping attacks is they are difficult to detect. Read about prevention measures to help keep your network safe from snoopers and sniffers. Read More
Elastic Stack Security tutorial: How to create detection rules
29 Nov 2021This excerpt from 'Threat Hunting with Elastic Stack' provides step-by-step instructions to create detection rules and monitor network security events data. Read More
Kr00k vulnerability compromises billions of Wi-Fi devices
27 Feb 2020Billions of Wi-Fi chips used in IoT devices, laptops, smartphones and tablets are vulnerable to a serious vulnerability Read More
Domain fronting: Why cloud providers are concerned about it
19 Jul 2018Domain fronting is a popular way to bypass censorship controls, but cloud providers like AWS and Google have outlawed its use. Expert Michael Cobb explains why. Read More
An insider’s look into the dark web
17 Jul 2018A principal research scientist at Sophos offers a glimpse into the abysses of the dark web in a bid to uncover what cyber crooks are up to Read More
5 critical components of a microservices security plan
15 Oct 2018Microservices have introduced a wave of security complexity. Before you run containerized microservices in production, carefully review these five critical security practices. Read More