662 Results for:ssl

  • Sort by: 

Risk & Repeat: Sale of Symantec Website Security completed

By Rob Wright 08 Nov 2017

In this week's Risk & Repeat podcast, SearchSecurity editors discuss the sale of Symantec Website Security to DigiCert and what it means for Symantec's troubled certificate business. Read More

Stolen digital certificates used in Plead malware spread

By Michael Heller 10 Jul 2018

Researchers found the spread of Plead malware was aided by the use of stolen digital certificates, making the software appear legitimate and hiding the true nature of the attacks. Read More

McAfee CTO raises concerns about election cyber security

By Warwick Ashford 22 Oct 2018

The security industry needs to look at the security of election processes around the world as well as the security of voting and counting machines, says McAfee CTO Read More

Working with Docker Compose? Use environmental variables

By Kurt Marko 14 Sep 2021

Docker Compose streamlines container application deployments. Dig into the tool and see how the use of environment variables can hone the process further. Read More

FBI and CISA issue vishing campaign warning

By Alexander Culafi 24 Aug 2020

The FBI and CISA have issued a joint advisory related to a vishing campaign that began in mid-July, with numerous attacks that gained access to corporate VPN credentials. Read More

Zero-day flaw in Sophos XG Firewall exploited in attacks

By Rob Wright, Alexander Culafi 27 Apr 2020

Sophos released an emergency patch over the weekend for its XG firewalls after threat actors exploited a zero-day SQL vulnerability in the products to steal customer data. Read More

Considerations for buying an application delivery controller

By Kevin Tolly 23 Feb 2018

Before you buy an ADC device, learn which features you should look for and what questions you should ask prospective application delivery controller vendors. Read More

What CIOs need to know about hardening IT infrastructure

By Paul Kirvan 28 Sep 2020

Infrastructure hardening is an ongoing, proactive way of life for CIOs and their IT teams. Here, we provide guidance to ensure that hardening is planned and implemented successfully. Read More

How layered security can help and hinder application security

By Kevin Beaver 31 May 2018

The growth of technology includes the growth of layered security. Join expert Kevin Beaver as he explains the pros and cons of layered defenses for application security. Read More

Three IoT encryption alternatives for enterprises to consider

By Judith Myerson 10 May 2018

The use of cryptography alternatives for IoT devices grants users certain benefits and potential security challenges. Learn more about each alternative with expert Judith Myerson. Read More