Stephen A. Thomas is chief architect for Wave7 Optics. He has been actively involved in TCP/IP standards development for nearly two decades, and has co-authored and contributed to numerous Internet ...
Mozilla has addressed a critical memory corruption vulnerability affecting its cross-platform Network Security Services (NSS) set of cryptography libraries. NSS can be used to develop security-enabled ...
eSpeaks’ Corey Noles talks with Rob Israch, President of Tipalti, about what it means to lead with Global-First Finance and how companies can build scalable, compliant operations in an increasingly ...
The volume of online transactions continues to grow exponentially, together with the number of web enabled endpoints like mobile and IoT devices. At the same time, privacy and cybersecurity concerns ...
As I’ve mentioned in several recent blogs, enterprise organizations are encrypting more and more of their network traffic. A majority (87%) of organizations surveyed as part of a recent ESG research ...
The last year has produced a rogues’ gallery of vulnerabilities in transport layer security implementations and new attacks on the key protocols, from Heartbleed to the Apple gotofail flaw to the ...
Two security researchers claim to have developed a new attack that can decrypt session cookies from HTTPS (Hypertext Transfer Protocol Secure) connections. Websites use session cookies to remember ...
As enterprises get better about encrypting network traffic to protect data from potential attacks or exposure, online attackers are also stepping up their Secure Sockets Layer/Transport Layer Security ...
Healthcare organizations rely on cryptography-based security, but the infrastructure faces radical change with the rise of quantum computing. A panel of experts at HIMSS26 will explore what's needed ...
Update: Apple has released 10.9.2, which patches the SSL vulnerability discussed in this article. News of a serious vulnerability within Apple’s implementation of a key encryption technology has been ...