It’s what you see and don’t see SSL/TLS is most easily described as relating to “that little lock in your browser bar”. However, as we move into the 21st century, different browsers are choosing different methods to visualize trust and authentication. In our new article, » Continue Reading.
From the vast network-of-networks that is the internet itself down to local corporate intranets, secure communications depend on having a properly-implemented public key infrastructure (PKI) to protect data in transit. However, not all PKIs are the same. A public PKI is built to face the » Continue Reading.
Organizations trying to come up with a Public Key Infrastructure (PKI)  plan are often confronted with the choice between public and private PKI. In an attempt to help with this decision, this article will talk about the pros and cons of both PKI solutions, » Continue Reading.
Avoid common HTTPS errors SUMMARY : We have all seen alarming connection security warnings when browsing the web. Although many ignore them, users and administrators alike should be aware of what these errors mean. We will discuss the most common HTTPS errors you might encounter » Continue Reading.
SSL.com now offers NAESB WEQ-12 digital certificates to allow access to the OATI webRegistery. This registry has replaced the TSIN registry and now serves as the central repository of information required to support scheduling, commercial, and transmission management operations in North America. Registered NERC participants » Continue Reading.
Last week’s overview explained why deprecating of older versions of TLS is a good move to strengthen secure data transfer in numerous applications. This week, we’re pleased to present a more in-depth look at how this is being mandated by some major standards organizations, such » Continue Reading.
The Transport Layer Security (TLS) protocol  is the primary means of protecting network communications over the Internet. It (and its predecessor, Secure Sockets Layer or SSL) have been used for decades in many applications, but most notably in browsers when they visit HTTPS sites. » Continue Reading.
Change is the only constant in internet security, and the evolution of standards to protect online traffic is a good example. In this fine article, our writer Nick Naziridis examines why major standards that impact you every day (including ones maintained by NIST and PCI » Continue Reading.