2011

Industry Commentary · Rethink Remote Access

What Network Monitoring Tools Give you Visibility into Corporate VPNs?

*Editor's Note: This column originally appeared in TechTarget's SearchEnterpriseWan

Highlights

What We're Reading, Week of 11/28

Technorati, The Continuing Need for VPN: A Rebuttal 

Highlights

What We're Reading, Week of 11/28

Technorati, The Continuing Need for VPN: A Rebuttal 

two-way SSL
IT policy · SSL

SSL Myth Busting: A Two-Way Certificate Exchange Between a SOA Web Service and a Client Can Always Be Trusted. [False.]

Today's SSL myth in our series deals with two-way certificate exchanges between a SOA web service and a client. We've already explained why one-way certificate authentication of a SOA web service is...

two-way SSL
IT policy · SSL

Myth #5: A Two-Way Certificate Exchange Between a SOA Web Service and a Client Can Always Be Trusted. [False.]

Today's SSL myth in our series deals with two-way certificate exchanges between a SOA web service and a client. We've already explained why one-way certificate authentication of a SOA web service is...

5-Enterprise-Shipping-Myths-Busted
Industry Commentary · Rethink Remote Access · SSL

SSL Myth Busting: Java Authentication and Authorization Services (JAAS) Framework Handles All Protocols and Mechanisms Securely [Nope.]

Onto the next post in our series debunking SSL myths. Today’s myth: Java Authentication and Authorization Services (JAAS) framework handles all protocols and mechanisms in a secure manner.

Mobile · Rethink Remote Access · SSL

FDE and VPN: Don’t Throw out the Security Baby with the Legacy Bathwater, Part 2

Editor's Note: This is part 2 in a series, "FDE and VPN: Don’t Throw out the Security Baby with the Legacy Bathwater." For part one, click here.

Highlights

What We're Reading, Week of 11/14

Dark Reading, Survey: Half of Firewall Rules Improperly Configured

Highlights

What We're Reading, Week of 11/14

Dark Reading, Survey: Half of Firewall Rules Improperly Configured

Rethink Remote Access · SSL

FDE and VPN: Don't Throw out the Security Baby with the Legacy Bathwater, Part 1

By Cameron Laird

This website uses cookies

We use cookies to personalize content and analyze access to our website. You can find further information in our data protection policy.

OK