Sicurezza

SSL: Protective Technology Turned Attack Vector

Pubblicato il

It’s been over 20 years since the earliest versions of the Secure Socket Layer (SSL)protocol emerged from a team of engineers at Netscape Communications. As the Internet and more specifically the World Wide Web began its precipitous climb in the early 1990’s these engineers recognized that to drive deeper interactions online, a standard for securing […]

Sicurezza

Work From Home Was The Sprint, Now Comes The Security Marathon

Pubblicato il

The last few months have seen enterprise IT changes at lightning speed. The pace is unlikely to slow. As the pandemic led to national stay-at-home orders, hundreds of millions of workers suddenly found themselves working from home. As internet traffic increases, it’s not only coming from an increased number of remote workers but also from […]

Sicurezza

Ensuring Remote Access Availability & Security

Pubblicato il

It’s clear that the COVID-19 virus has greatly impacted our lives in all aspects.   New terms like work from home, social distancing, and home isolation have stormed into our lives and altered our behaviors; we meet less people, go out less, and avoid in-person meetings. Market and Behavior These lifestyle changes are impacting our […]

Sicurezza

Visibility: Do You Know What’s In Your Network?

Pubblicato il

More than 70% of websites now use SSL encryption. The Google Transparency Report statistics below show a very rapid rise in adoptions of HTTPS for Chrome browser users worldwide. Unfortunately, the security provided by SSL/TLS is also misused to attack applications by injecting malicious content and hide malware. SSL is also being used to facilitate […]

Sicurezza

Detecting and Mitigating HTTPS Floods…Without Decryption Keys

Pubblicato il

What is an HTTPS flood attack? Why is everybody talking about it these days? And is it really such a big threat? HTTPS flood attack is a generic name for DDoS attacks that exploit SSL/TLS protocols over HTTP communications. Lately, we’ve been hearing much about this specific type of DDoS attack and other SSL/TLS attack […]

Sicurezza

Why You Still Need That DDoS Appliance

Pubblicato il

More and more organizations are adopting cloud-based DDoS defenses and substituting them for their old, premise-based DDoS appliances. Nonetheless, there are still a number of reasons why you might want to keep that DDoS appliance around. The Rise of Cloud Protection More and more organizations are deploying cloud-based DDoS mitigation services. Indeed, Frost & Sullivan […]

Sicurezza

Why Hybrid Always-On Protection Is Your Best Bet

Pubblicato il

Users today want more. The ubiquity and convenience of online competition means that customers want everything better, faster, and cheaper. One key component of the user experience is service availability. Customers expect applications and online services to be constantly available and responsive. The problem, however, is that a new generation of larger and more sophisticated […]

Sicurezza

How to (Securely) Share Certificates with Your Cloud Security Provider

Pubblicato il

Businesses today know they must handle sensitive data with extra care. But evolving cyber threats combined with regulatory demands can lead executives to hold their proverbial security cards close to their chest. For example, they may be reluctant to share encryption keys and certificates with a third party (i.e., cloud service providers), fearing data theft, […]

Sicurezza

Keeping Pace in the Race for Flexibility

Pubblicato il

Flexibility and elasticity. Both rank high on the corporate agenda in the age of digital transformation and IT is no exception. From the perspective of IT, virtualization and cloud computing have become the de facto standard for deployment models. They provide the infrastructure elasticity to make business more agile and higher performing and are the reason why the […]

Sicurezza

What is Transport Layer Security (TLS)?

Pubblicato il

Despite the goal of keeping Web communications private, flaws in the design and implementation of Transport Layer Security have led to breaches, but the latest version – TLS 1.3 – is an overhaul that strengthens and streamlines the crypto protocol. What is TLS? TLS is a cryptographic protocol that provides end-to-end communications security over networks […]