Standards  >   Security Standards  >  

Secure Socket Layer

RSS Feed   
Secure Socket Layer Reports
 
How SSL-Encrypted Web Connections are Intercepted
sponsored by SearchSecurity.com
EGUIDE: In this expert e-guide, uncover 4 key strategies for defending against illegal TLS/SSL-encrypted Web connection interception. Learn how these cyber-attacks work, the challenges of digital certificates, SSL-interception tools, and more by reading on now.
Posted: 27 Dec 2012 | Published: 17 Dec 2012

SearchSecurity.com

The exploitation of flaws in the HTTPS protocol
sponsored by ComputerWeekly.com
RESEARCH CONTENT: For both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.
Posted: 16 Apr 2019 | Published: 16 Apr 2019

ComputerWeekly.com

Defining a Cryptographic Center of Excellence
sponsored by Entrust, Inc.
EGUIDE: In this eguide, read about common use cases for crypto in IT systems and the five pillars of CryptoCoE.
Posted: 24 Mar 2021 | Published: 24 Mar 2021

TOPICS:  SSL
Entrust, Inc.

Remote Access VPNs: Business Productivity, Deployment, and Security Considerations
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper outlines the two primary methods of deploying remote access VPNs: IPsec and SSL. Read how to choose the right VPN technology for your organization, understand security considerations, and how to secure your remote-access VPN.
Posted: 08 Jul 2008 | Published: 01 Feb 2008

Cisco Systems, Inc.

Achieving Security With Cloud PC Backup
sponsored by Iron Mountain
WHITE PAPER: This document introduces the many security measures currently in place within the Iron Mountain data protection architecture to prevent unauthorized access or damage to customer data.
Posted: 14 Sep 2010 | Published: 14 Sep 2010

Iron Mountain

9 Reasons Why NetScaler Beats F5
sponsored by Citrix
WHITE PAPER: This whitepaper compares two market-leading application delivery controllers (ADCs) to help your organizations find the one that best aligns with your business needs.
Posted: 12 Aug 2013 | Published: 31 May 2013

Citrix

How to Gain Visibility and Control of Encrypted SSL Web Sessions
sponsored by BlueCoat
WHITE PAPER: Blue Coat's SSL proxy functionality enables organizations to extend the power of the intelligent and secure proxy appliances to all SSL traffic. Read about how a proxy gives visibility and control of SSL communications.
Posted: 20 Sep 2007 | Published: 01 Jan 2006

BlueCoat

Protecting User from Firesheep and Sidejacking Attacks with SSL
sponsored by VeriSign EMEA
WHITE PAPER: This paper addresses the problems of unsecured Wi-Fi including recent security concerns such as the Firesheep and sidejacking, and how to protect against these attacks. Learn how public websites can provide security with TLS/SSL by not only harden against many attacks, but also assure users of that security.  
Posted: 29 Jul 2011 | Published: 29 Jul 2011

VeriSign EMEA

Cloud Security Designed for Amazon Web Services (AWS)
sponsored by Trend Micro
WHITE PAPER: This white paper offers a brief overview of an Amazon Web Services security solution that relies on security pros to customize its offered features to efficiently and effectively defend your assets in the cloud.
Posted: 19 May 2014 | Published: 19 May 2014

Trend Micro

Best Practices for Implementing 2048-Bit SSL
sponsored by Citrix
WHITE PAPER: The role of secure sockets layer (SSL) technology is no longer a luxury, it is now a crucial part of all networking systems. This guide explores some best practices for implementing 2048-bit SSL and how it can benefit your network infrastructure.
Posted: 03 Jan 2014 | Published: 31 Dec 2011

Citrix
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences