SSL-TLS
6 Steps To Prepare For Post-Quantum Cryptography
Preparing for post-quantum cryptography is essential to ensure the security of digital communications and data ahead of when quantum computers can potentially break current today’s cryptographic algorithms. Here are six steps to ...
Extending NDR visibility in AWS IaaS
By Vijit Nair, Sr. Director, Product Management, Corelight Comprehensive visibility is challenging in a cloud environment. While these environments are rich sources of telemetry and logs, it is challenging for security teams ...
Android WebView: Are Secure Coding Practices Being Followed?
WebViews are very common on the Android applications. There are clear WebView security best practices, but are they being implemented? With our previous blog post in mind, Android WebView: Secure Coding Practices, ...
PCI DSS Version 3.2.1 Published by PCI Security Standards Council
The Payment Card Industry Security Standards Council (PCI SSC) published a minor revision to version 3.2 of its Data Security Standard (PCI DSS). On 17 May, PCI SSC published PCI DSS version ...
The Heartbleed Bug, gone in a heartbeat.
There is a hole in the heart of Internet security which has the potential to expose countless encrypted transactions. It’s been named the Heartbleed Bug. The bug was accidentally incorporated into OpenSSL ...