662 Results for:ssl
- Sort by:
Risk & Repeat: Sale of Symantec Website Security completed
08 Nov 2017In this week's Risk & Repeat podcast, SearchSecurity editors discuss the sale of Symantec Website Security to DigiCert and what it means for Symantec's troubled certificate business. Read More
Stolen digital certificates used in Plead malware spread
10 Jul 2018Researchers found the spread of Plead malware was aided by the use of stolen digital certificates, making the software appear legitimate and hiding the true nature of the attacks. Read More
McAfee CTO raises concerns about election cyber security
22 Oct 2018The security industry needs to look at the security of election processes around the world as well as the security of voting and counting machines, says McAfee CTO Read More
Working with Docker Compose? Use environmental variables
14 Sep 2021Docker Compose streamlines container application deployments. Dig into the tool and see how the use of environment variables can hone the process further. Read More
FBI and CISA issue vishing campaign warning
24 Aug 2020The FBI and CISA have issued a joint advisory related to a vishing campaign that began in mid-July, with numerous attacks that gained access to corporate VPN credentials. Read More
Zero-day flaw in Sophos XG Firewall exploited in attacks
27 Apr 2020Sophos released an emergency patch over the weekend for its XG firewalls after threat actors exploited a zero-day SQL vulnerability in the products to steal customer data. Read More
Considerations for buying an application delivery controller
23 Feb 2018Before you buy an ADC device, learn which features you should look for and what questions you should ask prospective application delivery controller vendors. Read More
What CIOs need to know about hardening IT infrastructure
28 Sep 2020Infrastructure hardening is an ongoing, proactive way of life for CIOs and their IT teams. Here, we provide guidance to ensure that hardening is planned and implemented successfully. Read More
How layered security can help and hinder application security
31 May 2018The growth of technology includes the growth of layered security. Join expert Kevin Beaver as he explains the pros and cons of layered defenses for application security. Read More
Three IoT encryption alternatives for enterprises to consider
10 May 2018The use of cryptography alternatives for IoT devices grants users certain benefits and potential security challenges. Learn more about each alternative with expert Judith Myerson. Read More