456 Results for:TLS

  • Sort by: 

Five TLS comms vulnerabilities hit Aruba, Avaya switching kit

By Sebastian Klovig Skelton 03 May 2022

Five new vulnerabilities in the implementation of transport layer security communications leave several popular switches vulnerable to remote code execution Read More

How does TLS 1.3 differ from TLS 1.2?

By Michael Cobb 05 Dec 2018

Compared to TLS 1.2, TLS 1.3 saw improvements in security, performance and privacy. Learn how TLS 1.3 eliminated vulnerabilities using cryptographic algorithms. Read More

Netgear under fire after TLS certificates found in firmware -- again

By Alexander Culafi 22 Jan 2020

Security researchers revealed Netgear firmware exposed TLS certificate keys, but SearchSecurity discovered it wasn't the first time the issue had been reported to the vendor. Read More

Making IT sustainability more objective and actionable

By Dale Vile 15 Mar 2024

I’ve heard a lot of pitches from technology companies on how they can help customers achieve their sustainability goals, and many of these follow a familiar pattern. They start with the global ... Read More

Choosing between an SSL/TLS VPN vs. IPsec VPN

By Lisa Phifer, John Burke 08 Oct 2019

Infosec pros need to know the ins and outs of SSL/TLS VPNs vs. IPsec VPNs to better understand which product's features will fulfill the needs of their organization. Get help comparing here. Read More

Congressional websites need to work on TLS

By Michael Heller 27 Sep 2018

Congressional websites may not always have the best security, according to Joshua Franklin. Although, senators may be better at website security than House representatives. Read More

How enterprises can ensure NVMe security in 2.0

By Dave Raffo 28 Apr 2022

Today's world demands airtight security more than ever. Key NVMe security features, such as namespaces, the Lockdown command and TLS in NVMe over TCP, keep data safe. Read More

Cisco Talos techniques uncover ransomware sites on dark web

By Alexander Culafi 28 Jun 2022

One of the three techniques Cisco Talos used to de-anonymize ransomware dark web sites is to match TLS certificate serial numbers from dark web leak sites to the clear web. Read More

Interception threatens TLS security; now what?

01 Sep 2017

As global cyberattacks have exploded in recent months, the speed of infection is causing damage, not only to targeted industries and nation states, but to corporate valuations. In June, FedEx warned that the Petya ... Read More

Updating TLS? Use cryptographic entropy for more secure keys

By Judith Myerson 15 Jan 2019

Cryptographic entropy is necessary to secure session encryption keys in TLS 1.2, but RSA key transport is not supported in TLS 1.3. Discover the causes for concern with Judith Myerson. Read More