January 12, 2016
Researchers in Germany have found two OAuth vulnerabilities, which could allow attackers to break the authorization and authentication standard. And an expert said the fix must be made to the standard itself.
December 17, 2015
Exchange 2016 brought mixed feelings for admins who felt like the release was more of an Exchange 2013 Service Pack than a new version. See which changes made it to the final release.
September 18, 2015
News roundup: Additional research shows a Cisco router implant affects more devices than originally reported. Plus: Let's Encrypt's first cert issued; Tor in the library; the mitigated (but not fixed) iOS AirDrop vulnerability.
August 04, 2015
The HTTP protocol is finally getting its first major overhaul, bringing a number of improvements to managing the connections between servers and users.
HTTP Get Started
Bring yourself up to speed with our introductory content
Developers can upgrade applications more efficiently and adapt to uneven workflows by ditching a monolithic architecture and switching to microservices. Continue Reading
Andreas and Michael Wittig, authors of 'Amazon Web Services in Action,' wrote about how to get started with Simple Storage Service, one of the most frequently used products in AWS. Continue Reading
Opportunistic encryption offers encryption for servers that don't support HTTPS. Expert Michael Cobb explains how it works and how it can help Web security. Continue Reading
Evaluate HTTP Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Let's Encrypt, a new open certificate authority, is coming soon. Expert Michael Cobb explores the merits of using free and open CAs and whether or not enterprises should explore them. Continue Reading
Facebook added OpenPGP encryption to its messaging services to help improve messaging safety. Expert Michael Cobb explains the benefits of the approach. Continue Reading
The evolution of IoT means the birth of IoT cloud services, and that means IT administrators will have to view their networks in new ways. Continue Reading
Learn to apply best practices and optimize your operations.
Advanced persistent threat groups are using public cloud services to their advantage. Expert Ed Moyle explains how enterprises can protect themselves. Continue Reading
Wireshark display tools such as capture and packet filtering offer critical insights into network functioning, but only if properly understood and managed. Continue Reading
Now more than ever, it's critical to keep track of the data being sent to the Internet even when your device is sitting idle. Brad Irby examines the tools you can use to do this. Continue Reading
Problem Solve HTTP Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
How can I enable Outlook Anywhere to allow internal use for all users and external use for only some users in Exchange 2013? Continue Reading
SSL subscription services are emerging to help enterprises handle the daunting task of SSL certificate management. Expert Michael Cobb discusses the benefits of such a service. Continue Reading
The cyberthreat landscape grows more dangerous by the day. Harvey Koeppel offers a 12-point cybersecurity checklist for CIOs. Continue Reading