Network Protocols and Security News
May 26, 2016
In order to stop metadata snooping by law enforcement and hackers, a proposed spec aims to improve DNS privacy with TLS.
April 15, 2015
PCI DSS 3.1 grants merchants about 14 months to nix flawed SSL and TLS protocols, but demands they quickly provide detailed new documentation on how they plan to make the transition.
April 05, 2015
Experts say even enterprises that carefully secure TLS may still be at the mercy of the numerous security issues affecting the SSL ecosystem.
March 31, 2015
Qualys has added a free, public API to its SSL testing services, which will enable an enterprise to test any website or server for SSL vulnerabilities.
Network Protocols and Security Get Started
Bring yourself up to speed with our introductory content
The Transport Layer Security (TLS) protocol defines a mechanism to encrypt and maintain data integrity for communications over a network. Continue Reading
Secure Shell (SSH) is a network protocol that secures data communications between computers on an insecure network using strong authentication and encryption. SSH also refers to the utility suite that implements the protocol, and which can be used ... Continue Reading
Microsegmentation makes network security more flexible with software-defined policies rather than manual configuration work, if implemented with forethought and the right tools. Continue Reading
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Evaluate Network Protocols and Security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Any website that collects or transmits sensitive information must be protected by Secure Socket Layer encryption. SSL and its successor, Transport Security Layer (TLS), are security protocols used to create an encrypted link between a server and a ... Continue Reading
To choose the best SSL for your enterprise, you need to stay up to date on SSL/TLS encryption developments. Learn why SSL/TLS remains a vital technology and how to determine the approach that will work best for your company. Continue Reading
Expert Rob Shapland takes a look at the best network access control products on the market today and examines the features and capabilities that distinguish the top vendors in this space. Continue Reading
Manage Network Protocols and Security
Learn to apply best practices and optimize your operations.
Interactive voice response systems can be used by attackers to hack into enterprises. Expert Nick Lewis explains the security risks of IVR systems and how to mitigate them. Continue Reading
Enterprise SDN controllers can be vulnerable to attacks, but a proper risk management plan can improve SDN controller security. Judith Myerson explains how to get started. Continue Reading
SSL/TLS, long the cornerstone of Web security, has become a security vulnerability due to problems with certificate authorities. Learn what solutions the industry is pursuing. Continue Reading
Problem Solve Network Protocols and Security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
The proliferation of network sensors for embedded systems and IoT devices can create problems for enterprises. Expert Kevin Beaver explains the risks these sensors pose. Continue Reading
Microsegmentation enables software-defined network security at a granular level, simplifying data center networks and traffic without risking breaches. Continue Reading
Transport Layer Security (TLS) and Secure Sockets Layer (SSL) cryptographic protocols have long been the cornerstone of Web application security, and the whole process finds its root (quite literally) in a system of signed certificates. The trouble ... Continue Reading