How Heartbleed changed open source software security

SSL and TLS VPN Security

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • SSL VPN: AEP SureWare A-Gate AG-600

    Learn why Information Security magazine believes this hardcore appliance provides enviable security defaults and convenient access to sensitive applications. 

  • How to configure an FTP server with SSL

    In this expert response, security expert Michael Cobb explains how to securely configure an FTP server with Secure Socket Layering (SSL). 

  • Securing public key transport

    Learn how a client uses the HTTPS protocol to request a secure Web page and initiate a secure Web site session. 

  • Secure Shell (SSH)

    Secure Shell (SSH), sometimes known as Secure Socket Shell, is a UNIX-based command interface and protocol for securely getting access to a remote computer. 

  • Is IPsec on borrowed time?

    IT professionals say SSL VPN connections are easier to secure and manage than their IPsec counterparts. But don't count IPsec out just yet. 

  • Crypto basics: VPNs

    In this excerpt of Chapter 3 from "Cryptography for Dummies," author Chey Cobb explains how virtual private networks (VPNs) use encryption to secure data in transit. 

  • Remote access as an attack vector

    In this excerpt of Chapter 7 from "The Black Book on Corporate Security," authors Howard Schmidt and Tony Alagna analyze how "unmanaged" remote access can serve as an attack vector. 

  • 'Black Book' offers tidbits, but not worth keeping

    Information Security magazine reviews "The Black Book on Corporate Security," published by Larstan Publishing. 

  • How to reduce risks with URL filtering

    Learn how to protect your network from threats by controlling the URLs that enter and leave it. 

  • Web Security School Lesson 3

    In Lesson 3 of Web Security School, Michael Cobb teaches you how to plan and implement Web directory structures and permissions, and manage secure Web development. Also, a primer on secure coding and data management, and procedures for combating Web ...