Checking for vulnerabilities is a challenge for many, but that doesn’t mean it’s not possible. See these three tips for making vulnerability scanners work better for your IT team.
Best Practices
STRIPTLS Attacks and Email Security
Only 35% of SMTP server have configured encryption protocols correctly. Low adoption rates of encryption and authentication and improper configuration can lead to a STRIPTLS attack.
How Short-Lived Certificates Improve Certificate Trust
Short-lived certificates are a new innovation that can be used to extend TLS protections to a greater number of users.
OpenSSL Patches Two Security Vulnerabilities
The “high” and “low” severity vulnerabilities in OpenSSL do not affect SSL Certificates, but patch your OpenSSL framework as soon as possible.
How to Avoid Whaling Attacks
The FBI stated that businesses worldwide have lost more than $1.2 billion to whaling attacks.
Smart Home Security in 2016: You Could Be Vulnerable
As smart devices find their place in the majority of modern homes, users must begin taking an active approach in protecting themselves and their homes from potential security breaches.
Most Hackable Devices and Suggested Tips
They’re your most frequently used devices, but they’re also the most frequently hacked devices. Learn what you can do to decrease the security risks on your devices.
Ordering a .Onion Certificate from DigiCert
DigiCert offers EV SSL Certificates for .onion addresses with a maximum validity period of 15 months.
‘Tis the Season for Holiday Cyber Scams
This year 51% of online shopping will be done on a mobile device but most mobile devices do not have the security to block common cyber threats.