+1-888-690-2424
  • Logjam Attack and Diffie-Hellman

    Researchers have discovered a vulnerability with the Diffie-Hellman key exchange mechanism in SSL/TLS called Logjam, which is similar to the FREAK attack, and have now published Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice and a Guide to Deploying Diffie-Hellman for TLS. The Logjam vulnerability allows a man-in-the-middle (MITM) attacker to downgrade vulnerable SSL/TLS connections to 512-bit export-grade cryptography. The

        in Alerts, SSL
    0
  • SSL Review: April 2015

    Entrust’s monthly SSL review covers SSL discussions — recaps news, trends and opinions from the industry. Entrust and CA Security Council Entrust Identity ON discussed: Evolving PKI Standards Raising the Benefits of HTTP/2 Security New SSL Certificates with New Keys Reduce Vulnerabilities SSL Best Practices – Deploy SSL with Confidence CA Security Council discussed: My Website’s SSL Certificate is Fine;

        in SSL
    0
  • SSL Best Practices – Deploy SSL with Confidence

    There are many risks with the implementation of security using SSL. Attacks can be formulated against the SSL/TLS protocol, the protocol may have been designed improperly by the server vendor, the certificate authority (CA) could be attacked or you may implement SSL improperly on your server. SSL Pulse surveys about 200,000 sites each month, grades them and ranks them by

        in Digital Certificates, SSL
    0
  • Raising the Benefits of HTTP/2 Security

    The approval of HTTP/2 by the Internet Engineering Steering Group (IESG) back in mid-February marked the next major version of the network protocol used by the web. HTTP/2 is based on Google’s protocol SPDY; the most recent standard that was implemented on Chrome, Firefox, Opera, Safari, and other browsers. The goal of HTTP/2 is to allow client/servers to choose a

        in SSL
    0
  • SSL Best Practices – Deploy SSL with Confidence

    There are many risks with the implementation of security using SSL. Attacks can be formulated against the SSL/TLS protocol, the protocol may have been designed improperly by the server vendor, the certificate authority (CA) could be attacked or you may implement SSL improperly on your server. SSL Pulse surveys about 200,000 sites each month, grades them and ranks them by

        in Digital Certificates, SSL
    0
  • Raising the Benefits of HTTP/2 Security

    The approval of HTTP/2 by the Internet Engineering Steering Group (IESG) back in mid-February marked the next major version of the network protocol used by the web. HTTP/2 is based on Google’s protocol SPDY; the most recent standard that was implemented on Chrome, Firefox, Opera, Safari, and other browsers. The goal of HTTP/2 is to allow client/servers to choose a

        in SSL
    0
Page 1 of 47123...5101520...»»