458 Results for:TLS

  • Sort by: 

BlackBerry Messenger to shut down, paid version available

By Tanner Harding 22 Apr 2019

The original encrypted BBM app will no longer be available as of May 31 as BlackBerry and Emtek go their separate ways, though the subscription enterprise version is now available. Read More

Managing VPN bandwidth requirements, speed and overhead

By Terry Slattery 10 Aug 2020

Companies are relying on IPsec VPNs to connect their remote workers. But determining how much VPN bandwidth you need is just one consideration; VPN overhead is another. Read More

Implementing Dmarc a top priority for UK

By Warwick Ashford 11 Jun 2019

Basic email security should be a top priority for UK firms, followed by reducing third-party web exposure and monitoring data flows leaving the enterprise, a Rapid7 study reveals Read More

Embedded application security: Inside OWASP's best practices

By Judith Myerson 15 Feb 2018

OWASP released a draft of new guidelines for creating secure code within embedded software. Expert Judith Myerson discusses best practices, pitfalls to avoid and auditing tools. Read More

How to prevent network eavesdropping attacks

By Sharon Shea 19 Jun 2020

One of the biggest challenges of network eavesdropping attacks is they are difficult to detect. Read about prevention measures to help keep your network safe from snoopers and sniffers. Read More

Elastic Stack Security tutorial: How to create detection rules

By Kyle Johnson, Packt Publishing 29 Nov 2021

This excerpt from 'Threat Hunting with Elastic Stack' provides step-by-step instructions to create detection rules and monitor network security events data. Read More

Kr00k vulnerability compromises billions of Wi-Fi devices

By Alex Scroxton 27 Feb 2020

Billions of Wi-Fi chips used in IoT devices, laptops, smartphones and tablets are vulnerable to a serious vulnerability Read More

Domain fronting: Why cloud providers are concerned about it

By Michael Cobb 19 Jul 2018

Domain fronting is a popular way to bypass censorship controls, but cloud providers like AWS and Google have outlawed its use. Expert Michael Cobb explains why. Read More

An insider’s look into the dark web

By Aaron Tan 17 Jul 2018

A principal research scientist at Sophos offers a glimpse into the abysses of the dark web in a bid to uncover what cyber crooks are up to Read More

5 critical components of a microservices security plan

By Twain Taylor 15 Oct 2018

Microservices have introduced a wave of security complexity. Before you run containerized microservices in production, carefully review these five critical security practices. Read More