Organizations trying to come up with a Public Key Infrastructure (PKI)  plan are often confronted with the choice between public and private PKI. In an attempt to help with this decision, this article will talk about the pros and cons of both PKI solutions, » Continue Reading.
Last week’s overview explained why deprecating of older versions of TLS is a good move to strengthen secure data transfer in numerous applications. This week, we’re pleased to present a more in-depth look at how this is being mandated by some major standards organizations, such » Continue Reading.
The Transport Layer Security (TLS) protocol  is the primary means of protecting network communications over the Internet. It (and its predecessor, Secure Sockets Layer or SSL) have been used for decades in many applications, but most notably in browsers when they visit HTTPS sites. » Continue Reading.
SUMMARY: Major commercial and governmental standards organizations are now requiring use of newer, more secure versions of Transport Layer Security (TLS) to protect your information. We explain why this is a good move and what it means to you. Introduction Earlier this year, the Payment » Continue Reading.
Installing an SSL Certificate on the modern (> 0.7.14) nginx platform is quite easy. Locate the server block for your website. Add a listen directive for your secure port and add the ssl Add the ssl_certificate directive; the parameter is the full path to » Continue Reading.
Configuring Apache to Disable SSL v 3.0 The Apache HTTP Server is configured by placing directives in plain text configuration files. The main configuration file is usually called httpd.conf, and it is easy to update the Apache web server to disable SSLv3 (and thus protect your websites » Continue Reading.
House of Cards a Solid Foundation for Netflix Netflix HTTPS Coming Soon Prices for Netflix stock have been going up because the company is doing so well, especially with the coveted 18 to 34 year old demographic. With original programming like House of Cards, Orange » Continue Reading.
Gobs of Routers Found to Be Vulnerable to FREAK Attack Leave it to the Brits. Some researchers from Royal Holloway of the University of London were curious about how many devices they could find on the internet that were still vulnerable to a FREAK attack. The » Continue Reading.
A protocol is simply a set of rules or instructions that determine how to act or interact in a given situation. A cryptographic protocol is designed to allow secure communication under a given set of circumstances. The cryptographic protocol most familiar to internet users is » Continue Reading.
Microsoft, Google and Mozilla have all announced various plans to stop supporting SHA-1 SSL certificates after January 1, 2017. As a result, SSL.com began issuing SSL certificates using only SHA-2 (aka SHA-256) as the default hashing algorithm starting September 24, 2014. There are no special flags » Continue Reading.