Experts question customized TLS implementation after Amazon s2n flaw
Amazon’s s2n passed its first test by patching a flaw quickly, but experts said enterprises still need to be wary of the complexities surrounding TLS implementation. The post Experts question...
View ArticleFrom SSL and early TLS to TLS 1.2: Creating a PCI DSS 3.1 migration plan
PCI DSS 3.1 requires enterprises to deplete SSL and early TLS use by June 30, 2016. Expert Michael Cobb offers advice for putting a migration plan to TLS 1.2 in place. The post From SSL and early TLS...
View ArticleHas your organization started its migration to TLS 1.2?
The post Has your organization started its migration to TLS 1.2? appeared first on Discussions.
View ArticleHow does your organization plan to conduct TLS migration to stay PCI DSS...
The post How does your organization plan to conduct TLS migration to stay PCI DSS compliant? appeared first on Discussions.
View ArticlePCI DSS 3.1 deadline for TLS migration pushed back
The Payment Card Industry Security Standards Council unexpectedly pushed back the deadline for enterprises to migrate off of early versions of TLS. The post PCI DSS 3.1 deadline for TLS migration...
View ArticleHow does your organization address security issues with the TLS protocol?
The post How does your organization address security issues with the TLS protocol? appeared first on Discussions.
View ArticleTLS protocol: Can a client puzzle improve security?
The TLS protocol has fallen on hard times, but expert Michael Cobb explains how client puzzles can help fix some of the problems. The post TLS protocol: Can a client puzzle improve security? appeared...
View ArticleHow does the Logjam vulnerability affect TLS encryption?
Expert Michael Cobb discusses the TLS protocol flaw dubbed Logjam and explains how to detect if enterprise systems are at risk, as well as how to remediate them. The post How does the Logjam...
View ArticleHas your enterprise been affected by the Logjam vulnerability?
The post Has your enterprise been affected by the Logjam vulnerability? appeared first on Discussions.
View ArticleHas your organization moved to TLS? If not, are there plans to do so?
The post Has your organization moved to TLS? If not, are there plans to do so? appeared first on Discussions.
View ArticleWhat skills do you need to work with Microsoft Exchange TLS?
The post What skills do you need to work with Microsoft Exchange TLS? appeared first on Discussions.
View ArticleKeep email safe with Exchange TLS and cloud-based ATP
There are a bevy of native tools from Microsoft that can aid Exchange administrators in securing email messages and protecting against malicious links and attachments. The post Keep email safe with...
View ArticleDROWN attack: TLS under fire again
News roundup: DROWN attack affects millions of servers with an SSLv2 vulnerability; the Home Depot breach lawsuit settlement is pending; and Chinese smartphone-maker ZTE is sanctioned. The post DROWN...
View ArticleHow have previous TLS/SSL vulnerabilities, such as Heartbleed or POODLE,...
The post How have previous TLS/SSL vulnerabilities, such as Heartbleed or POODLE, affected your organization? appeared first on Discussions.
View ArticleWhat is the business case for the s2n TLS implementation?
Amazon Web Services purports its s2n TLS protocol creation is simpler, easier to manage and more secure than standard TLS. Expert Dan Sullivan explains. The post What is the business case for the s2n...
View ArticleDo you think s2n will help improve TLS security?
The post Do you think s2n will help improve TLS security? appeared first on Discussions.
View ArticleLogjam flaw crimps TLS encryption; NSA may have used it
A newly discovered TLS vulnerability that affects thousands of Web sites, servers and browser users could allow attackers to bypass encryption. The post Logjam flaw crimps TLS encryption; NSA may have...
View ArticleExperts question customized TLS implementation after Amazon s2n flaw
Amazon’s s2n passed its first test by patching a flaw quickly, but experts said enterprises still need to be wary of the complexities surrounding TLS implementation. The post Experts question...
View ArticleTLS protocol: Can a client puzzle improve security?
The TLS protocol has fallen on hard times, but expert Michael Cobb explains how client puzzles can help fix some of the problems. The post TLS protocol: Can a client puzzle improve security? appeared...
View Article