TLS White Papers
-
The exploitation of flaws in the HTTPS protocol
Sponsored by: TechTarget ComputerWeekly.comFor both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.
-
The Pros and Cons of Delivering Web Pages Over an SSL Connection
Sponsored by: TechTarget SecurityThough Secure Sockets Layer (SSL) offers distinct security advantages, there are drawbacks to this method of webpage delivery, as well. This expert e-guide explores the pros and cons of delivering webpages over an SSL connection. See if this strategy is right for your organization – read on to learn more.
-
How SSL-Encrypted Web Connections are Intercepted
Sponsored by: TechTarget SecurityIn this expert e-guide, uncover 4 key strategies for defending against illegal TLS/SSL-encrypted Web connection interception. Learn how these cyber-attacks work, the challenges of digital certificates, SSL-interception tools, and more by reading on now.
-
Securing Corporate Data in the Age of Mobile Computing
Sponsored by: TechTarget SecurityThis Expert Briefing from SearchConsumerization.com discusses key tips for enterprises to allow employees to work from their personal devices while ensuring corporate data remains secure.
-
Organizations Struggle through a Tough Year for SSL Protocols
Sponsored by: Symantec Website SecurityIn this expert e-guide, learn the three primary SSL security issues and the common mistakes organizations make when trying to secure their website. Continue reading and discover how to avoid falling prey to the top SSL/TLS threats.
-
The Problem with the Padlock
Sponsored by: TechTarget SecurityTLS/SSL is no longer a Web security cornerstone. While the industry responds to its vulnerabilities, with TLS 1.3, learn what else you must do to keep your connections secure.
-
How SSL and TLS Secure Network Transactions
Sponsored by: Symantec & Blue Coat SystemsThis expert e-guide explores how SSL and TLS can be used to defend any type of network traffic.
-
Your Guide for Migrating from 1024-bit to Stronger SSL Certificate Key Lengths
Sponsored by: Symantec Website Security SolutionsAs a proactive measure, the NIST has recommended that organizations eliminate 1024-bit RSA certificates in favor of stronger keys. Learn about the upcoming change in key lengths and find tips for managing your transition to using stronger certificates.
-
High Performance, High Capacity 2048/4096-bit SSL Offload
Sponsored by: A10 NetworksThis informative white paper explains the need for secure socket layer (SSL) offloading in order to reduce added pressure on central processing units (CPUs) from 4096-bit keys.
-
Protecting Your Website With Always On SSL
Sponsored by: Symantec CorporationThis white paper discusses the imperative need for always on SSL, and the steps you can take to deliver end-to-end protection for your users. It also includes detailed accounts of four organizations that are leading the way with always on SSL in a cooperative effort to make the internet more secure.
-
How SSL and TLS Secure Network Transactions
Sponsored by: GeoTrust, Inc.This E-Guide from SearchEnterpriseWAN.com aims to provide introductory knowledge of the ins and outs of SSL VPN and TLS and how they protect network transactions. View now to learn more!
-
Protecting User from Firesheep and Sidejacking Attacks with SSL
Sponsored by: VeriSign EMEAThis paper addresses the problems of unsecured Wi-Fi including recent security concerns such as the Firesheep and sidejacking, and how to protect against these attacks. Learn how public websites can provide security with TLS/SSL by not only harden against many attacks, but also assure users of that security.