Skip to main content

Posts

Showing posts from 2017

Featured

Will TLS 1.3 Ruin Security Production Tools?

With the ever-escalating cyberthreats, newer versions of encryption protocols have been developed to address vulnerabilities and support stronger, more secure ciphers and algorithms.

The Background
The Transport Layer Security (TLS) protocol was developed as a successor to the Secure Sockets Layer (SSL).  SSL and TLS are mostly the same cryptographic protocols running at the application layer of the Open Systems Interconnection (OSI) model. Both provide authentication and data encryption between servers, devices, and applications operating over a network.  SSL 1.0 was initially developed by Netscape in 1995 with SSL 2.0 version released for general use. In 1996, it was replaced by SSL 3.0 after several vulnerabilities were discovered. As more vulnerabilities were found, both SSL versions were deprecated in 2011 and 2015 respectively.

TLS 1.0 was released in 1999 through the Internet Engineering Task Force (IETF) organization to standardize SSL. While both SSL and TLS are mostly the same,…

Will 2018 Be a Year Addressing the Skills Gap and Cloud Security?

Things to Consider When Calculating the Return on Security Investment

Security Awareness Tips for The Holidays

Filling the Cybersecurity Skills Gap With Freelance Security Professionals

Security Awareness Training Is a Team Effort

Don’t Let Organizational Politics Derail Security Initiatives

The CISO’s Guide to Minimizing Health Care Security Risks

When Responding to a Data Breach, Cooperation Is Nine-Tenths of the Law

The CISO’s Guide to Managing Insider Threats

Why Machine Learning Is an Essential Tool In the CISO’s Arsenal

Hire a Team of Hackers to Identify Vulnerabilities

Is Cloud Security a Safe Bet for Highly Sensitive Government Data?

Succession Planning: The Importance of a Deputy CISO

Information Security in the Age of Disinformation

Is the CISO Job Market Overcrowded?

Building an Effective CISO-CIO Partnership

How The Next-Generation CISO Will Lead Security Strategy