ComputerWeekly.com Research Library

Powered by Bitpipe.com

TLS White Papers

  • The exploitation of flaws in the HTTPS protocol

    Sponsored by: TechTarget ComputerWeekly.com

    For both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.

  • The Pros and Cons of Delivering Web Pages Over an SSL Connection

    Sponsored by: TechTarget Security

    Though Secure Sockets Layer (SSL) offers distinct security advantages, there are drawbacks to this method of webpage delivery, as well. This expert e-guide explores the pros and cons of delivering webpages over an SSL connection. See if this strategy is right for your organization – read on to learn more.

  • How SSL-Encrypted Web Connections are Intercepted

    Sponsored by: TechTarget Security

    In this expert e-guide, uncover 4 key strategies for defending against illegal TLS/SSL-encrypted Web connection interception. Learn how these cyber-attacks work, the challenges of digital certificates, SSL-interception tools, and more by reading on now.

  • Securing Corporate Data in the Age of Mobile Computing

    Sponsored by: TechTarget Security

    This Expert Briefing from SearchConsumerization.com discusses key tips for enterprises to allow employees to work from their personal devices while ensuring corporate data remains secure.

  • Organizations Struggle through a Tough Year for SSL Protocols

    Sponsored by: Symantec Website Security

    In this expert e-guide, learn the three primary SSL security issues and the common mistakes organizations make when trying to secure their website. Continue reading and discover how to avoid falling prey to the top SSL/TLS threats.

  • The Problem with the Padlock

    Sponsored by: TechTarget Security

    TLS/SSL is no longer a Web security cornerstone. While the industry responds to its vulnerabilities, with TLS 1.3, learn what else you must do to keep your connections secure.

  • How SSL and TLS Secure Network Transactions

    Sponsored by: Symantec & Blue Coat Systems

    This expert e-guide explores how SSL and TLS can be used to defend any type of network traffic.

  • Your Guide for Migrating from 1024-bit to Stronger SSL Certificate Key Lengths

    Sponsored by: Symantec Website Security Solutions

    As a proactive measure, the NIST has recommended that organizations eliminate 1024-bit RSA certificates in favor of stronger keys. Learn about the upcoming change in key lengths and find tips for managing your transition to using stronger certificates.

  • High Performance, High Capacity 2048/4096-bit SSL Offload

    Sponsored by: A10 Networks

    This informative white paper explains the need for secure socket layer (SSL) offloading in order to reduce added pressure on central processing units (CPUs) from 4096-bit keys.

  • Protecting Your Website With Always On SSL

    Sponsored by: Symantec Corporation

    This white paper discusses the imperative need for always on SSL, and the steps you can take to deliver end-to-end protection for your users. It also includes detailed accounts of four organizations that are leading the way with always on SSL in a cooperative effort to make the internet more secure.

  • How SSL and TLS Secure Network Transactions

    Sponsored by: GeoTrust, Inc.

    This E-Guide from SearchEnterpriseWAN.com aims to provide introductory knowledge of the ins and outs of SSL VPN and TLS and how they protect network transactions. View now to learn more!

  • Protecting User from Firesheep and Sidejacking Attacks with SSL

    Sponsored by: VeriSign EMEA

    This paper addresses the problems of unsecured Wi-Fi including recent security concerns such as the Firesheep and sidejacking, and how to protect against these attacks. Learn how public websites can provide security with TLS/SSL by not only harden against many attacks, but also assure users of that security.  

Browse by Report Type: TLS White Papers | TLS Multimedia | TLS IT Downloads

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.