SSL

Cyber Security Predictions

2016 was the Year of DDoS. 2017 was the Year of Ransom. Can we assess leading indicators of new attack techniques and motivations to...

Financial Institutions Must Protect the Data Like They Protect the Money

If you are like most people and myself, you do not go into a bank and have a conversation with a teller when you...

5 Key Items for the Digital Transformation of Healthcare

People’s lives are at risk as the healthcare industry transforms patient care with modern IT technologies. Data security and application availability are essential when...

2017’s 5 Most Dangerous DDoS Attacks & How to Mitigate Them (Part 1)

Throughout the history of mankind, whether in warfare or crime, the advantage has swung between offense and defense, with new technologies and innovative tactics...

SSL Attacks – When Hackers Use Security Against You

In World War II, the Allies had a significant advantage because they were able to compromise the encryption protocols that the Japanese and Germans...

Outbound SSL Solutions Protect Assets in the Wild

Businesses need to protect their assets when they are within their protective infrastructure AND when they are actively exposed or placed within the unprotected...

Cyber and Securities – Financial Institutions Attack Landscape

Recently Italian bank Unicredit suffered two security breaches. Data of 400,000 customers was stolen, including loan account numbers and Personally Identifiable Information (PII). There...

The ADC is the Key Master for All Things SSL/TLS

In the movies (and real life) one often needs to go through the Key Master to get to the destination. The job of the...

The World is Changing

The world is changing; it always has but the world is changing faster now than it ever has before. This general change is translating...

To stay secure: Four new SSL implementation thoughts

10 years ago, I left my position as the principal architect at a major U.S. financial institution. We developed the standards for how SSL...

Network Security Does Not Matter When You Invite the Hacker Inside

We build security solutions to protect our networks from the rest of the internet, but do we do anything to protect the network from...

5G Mobile Security Challenge

A few months ago, I attended the 5G World Congress and listened to discussions around the many challenges and technical requirements facing 5G technology. The questions...

Must Read

Application Security in the Microservices Era

As organizations break their applications down into microservices, the responsibility for securing these environments is shifting as well.

The Evolution of Application Development

Delivering and securing containers and microservices is relatively new. Though there may be a few hiccups, all will normalize to a strong, steady state.

Agile Security Is Now A Reality

Businesses are looking to optimize and accelerate their SDLC, in order to improve their operational efficiency and gain a competitive edge.

New DemonBot Discovered

Are you using Hadoop for data analytics? If so, know that a new bot is targeting Hadoop clusters with the intention of performing DDoS...

IDBA: A Patented Bot Detection Technology

Over half of all internet traffic is generated by bots — some legitimate, some malicious. Competitors and adversaries alike deploy “bad” bots that leverage different methods to achieve nefarious objectives. This includes account takeover, scraping data, denying available inventory and launching denial-of-service attacks with the intent of stealing data or causing service disruptions.