+1-888-690-2424
  • SSL Best Practices – Deploy SSL with Confidence

    There are many risks with the implementation of security using SSL. Attacks can be formulated against the SSL/TLS protocol, the protocol may have been designed improperly by the server vendor, the certificate authority (CA) could be attacked or you may implement SSL improperly on your server. SSL Pulse surveys about 200,000 sites each month, grades them and ranks them by

        in Digital Certificates, SSL
    0
  • New SSL Certificates with New Keys Reduce Vulnerabilities

    As of April 1st, 2015, the lifetime of SSL certificates has now been reduced to 39 months, in accordance with the CA/Browser Forum Baseline Requirements. The certification authorities (CAs) will probably receive some pushback from customers who like to use 4- or 5-year certificates (where five years was the previous maximum). Back before 2012, there was no maximum, and some

        in General
    0
  • Microsoft Deploys Certificate Reputation

    As we have stated previously, website owners have a concern that an attacker can have a certificate issued for their domain name. We now have two systems which will help monitor certificates for domains: Certificate Transparency (CT) and Certificate Reputation. At the start of 2015, most certification authorities (CAs) support CT as requested by Google. CT works for extended validation

        in General
    0
  • Raising the Benefits of HTTP/2 Security

    The approval of HTTP/2 by the Internet Engineering Steering Group (IESG) back in mid-February marked the next major version of the network protocol used by the web. HTTP/2 is based on Google’s protocol SPDY; the most recent standard that was implemented on Chrome, Firefox, Opera, Safari, and other browsers. The goal of HTTP/2 is to allow client/servers to choose a

        in SSL
    0
  • Microsoft Deploys Certificate Reputation

    As we have stated previously, website owners have a concern that an attacker can have a certificate issued for their domain name. We now have two systems which will help monitor certificates for domains: Certificate Transparency (CT) and Certificate Reputation. At the start of 2015, most certification authorities (CAs) support CT as requested by Google. CT works for extended validation

        in General
    0
  • Raising the Benefits of HTTP/2 Security

    The approval of HTTP/2 by the Internet Engineering Steering Group (IESG) back in mid-February marked the next major version of the network protocol used by the web. HTTP/2 is based on Google’s protocol SPDY; the most recent standard that was implemented on Chrome, Firefox, Opera, Safari, and other browsers. The goal of HTTP/2 is to allow client/servers to choose a

        in SSL
    0
Page 2 of 45123...5101520...»»