Why 'Heartbleed' is a slow-motion train wreck
  • heartbleed

    Why 'Heartbleed' is a slow-motion train wreck

    Why 'Heartbleed' is a slow-motion train wreck

    Analysis: The 'Heartbleed' OpenSSL vulnerability is one of the worst bugs a SANS expert has seen, and that's before the fallout is fully understood.


    Heartbleed causes certificate cleanup nightmare

    In the wake of the Heartbleed OpenSSL vulnerability, the massive deluge of revoked certificates could cause palpitations across the Internet.

  • Does Heartbleed pose a risk to Android users?

    Though millions of Android devices could contain the Heartbleed OpenSSL vulnerability, experts say the risk to Android users may not be that great.

  • Heartbleed

    Heartbleed is a vulnerability in some implementations of OpenSSL. Because OpenSSL is used by approximately 66% of all active websites on the Intern...

SSL and TLS VPN Security

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • server accelerator card (SSL card)

    A server accelerator card (also known as an SSL card) is a Peripheral Component Interconnect (PCI) card used to generate encryption keys for secure transactions on e-commerce Web sites. 

  • SSL VPN: AEP SureWare A-Gate AG-600

    Learn why Information Security magazine believes this hardcore appliance provides enviable security defaults and convenient access to sensitive applications. 

  • How to configure an FTP server with SSL

    In this expert response, security expert Michael Cobb explains how to securely configure an FTP server with Secure Socket Layering (SSL). 

  • Securing public key transport

    Learn how a client uses the HTTPS protocol to request a secure Web page and initiate a secure Web site session. 

  • Secure Shell (SSH)

    Secure Shell (SSH), sometimes known as Secure Socket Shell, is a UNIX-based command interface and protocol for securely getting access to a remote computer. 

  • Is IPsec on borrowed time?

    IT professionals say SSL VPN connections are easier to secure and manage than their IPsec counterparts. But don't count IPsec out just yet. 

  • Crypto basics: VPNs

    In this excerpt of Chapter 3 from "Cryptography for Dummies," author Chey Cobb explains how virtual private networks (VPNs) use encryption to secure data in transit. 

  • Remote access as an attack vector

    In this excerpt of Chapter 7 from "The Black Book on Corporate Security," authors Howard Schmidt and Tony Alagna analyze how "unmanaged" remote access can serve as an attack vector. 

  • 'Black Book' offers tidbits, but not worth keeping

    Information Security magazine reviews "The Black Book on Corporate Security," published by Larstan Publishing. 

  • How to reduce risks with URL filtering

    Learn how to protect your network from threats by controlling the URLs that enter and leave it.