SSL Configuration Best Practices Part 3: Cipher Security Configuration

SSL Configuration Best Practices Part 3: Cipher Security Configuration

Secure Sockets Layer (SSL) configuration is a critical component of defending publicly accessible web applications against man-in-the-middle and other attacks. This third of a three-part series on SSL configuration best practices explores server protocol and cipher configuration.

Read More

6 Easy Ways to Protect Healthcare Information

6 Easy Ways to Protect Healthcare Information

The reality is that cyber-crimes involving ransomware are on the rise. In fact, the Ponemon Institute estimates that data breaches cost the healthcare industry $6.2 billion annually. So, how can you protect healthcare information from being exposed to these costly, malicious cyber-attacks?

Read More

SSL Configuration Best Practices Part 2: Server Certificates

SSL Configuration Best Practices Part 2: Server Certificates

Secure Sockets Layer (SSL) configuration is a critical component of defending publicly accessible web applications against man-in-the-middle and other attacks. This second of a three-part series on SSL configuration best practices explores SSL server certificate best practices.

Read More

SSL Configuration Best Practices Part 1: SSL Secure Server Design

SSL Configuration Best Practices Part 1: SSL Secure Server Design

Secure Sockets Layer (SSL) configuration is a critical component of defending publicly accessible web applications against man-in-the-middle attacks. This is the first of a three-part series on SSL configuration best practices. We’ll start with SSL secure server design.

Read More

3 Vulnerability Management Best Practices

3 Vulnerability Management Best Practices

In today’s business environment, organizations simply cannot sit around and wait for cyberattacks to occur. Fear of an attack along with the legal, brand reputation, and fiscal consequences should be motivation enough to for any business to implement vulnerability management best practices. Proactive vulnerability management (VM) has become a necessity and a well-managed VM system can ...

Read More

Situational Awareness in Cyber Security

Situational Awareness in Cyber Security

Situational awareness originated as a military term, with the United States Army Field Manual defining “Situational Awareness” as “Knowledge and understanding of the current situation which promotes the timely, relevant, and accurate assessment of friendly, enemy, and other operations within the battle space in order to facilitate decision making.” More and more, however, the military and civilian business worlds are applying this idea to ...

Read More

Penetration Testing Versus A Simple Vulnerability Assessment

Penetration Testing Versus A Simple Vulnerability Assessment

In this increasingly dangerous cyber world, smart organizations are continually looking for ways to shore up security. Many companies turn to security assessments and testing to do so. Vulnerability assessments and penetration testing represent two approaches to security testing, but is there really a difference between them and does one offer an advantage? In truth, any security ...

Read More