CloudInsidr

Cyber security, infotech

  • Subscribe!
  • Privacy Policy
  • Legal
  • Contact Us

Join us on Twitter: @CloudInsidr

  • news & alerts
    • events
    • industry analysis
    • industry gossip
    • people
  • cloud, edge & co.
    • AWS
    • administration & orchestration
      • web servers in the cloud
      • mail servers
      • databases
  • cybersec & warfare
    • encryption
  • blockchain
Home Archives for cybersecurity and cyber warfare encryption
Fixing DNS: why you need a Trusted Recursive Resolver and DNS over HTTPS

Cloud Insidr 2018-06-06 Leave a Comment

Fixing DNS: why you need a Trusted Recursive Resolver and DNS over HTTPS

The DNS system is broken. The sorry state of DNS security exposes your server and your end users to a variety of risks. Some of those risks are preventable.

[Read more…]

Filed Under: cybersecurity and cyber warfare, DNS, encryption Tagged With: DNS, DNS checks, DNS over HTTPS, encryption

TLS 1.3 and post-quantum cryptography: unleashing perfect forward secrecy

Cloud Insidr 2018-06-03 Leave a Comment

TLS 1.3 and post-quantum cryptography: unleashing perfect forward secrecy

TLS 1.3 and post-quantum cryptography are subjects of much debate. Upgrade or wait—this is the big question facing administrators and users alike.

There are quite a few reasons to jump onto the TLS 1.3 bandwagon immediately, with or without quantum cryptography. Here is why.  

[Read more…]

Filed Under: cloud, edge and everything in between, cybersecurity and cyber warfare, encryption Tagged With: GDPR, perfect forward secrecy, post-quantum cryptography, TLS 1.3

TLS tune-up: how to restrict Firefox to TLS v1.3 and v1.2 to protect from phishing attacks

Cloud Insidr 2018-06-02 Leave a Comment

TLS tune-up: how to restrict Firefox to TLS v1.3 and v1.2 to protect from phishing attacks

Only two versions of the TLS (Transport Layer Security) protocol can be considered safe under certain circumstances: TLS 1.3 and TLS 1.2. Trying to get your bank alongside everyone else to fix their websites and web applications is a Herculean task; good luck trying. Even so, you can protect TLS connections by modifying the browser configuration.

It is good to know that there is something you can do to protect at least yourself and the other end users on the networks that you oversee from nasty attacks against their TLS connections. In Firefox, you can restrict the browser to “speak” only TLS 1.3 and TLS 1.2 to limit the attack surface and restrict phishing. Here is how to do it.

[Read more…]

Filed Under: cybersecurity and cyber warfare, encryption Tagged With: TLS, TLS 1.2, TLS 1.3, TLS vulnerabilities

How to install the most recent version of OpenSSL on Windows 10 in 64 Bit

Cloud Insidr 2018-06-02 Leave a Comment

How to install the most recent version of OpenSSL on Windows 10 in 64 Bit

In the age of cyber warfare, being paranoid is the only reasonable attitude and that means, among other things, being paranoid about software updates.

[Read more…]

Filed Under: administration and orchestration, cloud, edge and everything in between, cybersecurity and cyber warfare, encryption, web servers in the cloud Tagged With: cyber security, Linux, OpenSSL, Windows

Attack vectors against TLS, implementation bugs, and how to mitigate TLS vulnerabilities in NGINX

Cloud Insidr 2018-05-21 Leave a Comment

Attack vectors against TLS, implementation bugs, and how to mitigate TLS vulnerabilities in NGINX

In light of documented TLS vulnerabilities and implementation bugs, understanding known attack vectors becomes a necessity.

[Read more…]

Filed Under: cybersecurity and cyber warfare, encryption, Uncategorized Tagged With: certificate, cipher suites, cryptography, cybersecurity, Diffie-Hellman, encryption, exploits, HTTP/2, HTTPS, mitigation techniques, RSA, TLS, TLS vulnerabilities

  • « Previous Page
  • 1
  • 2
  • 3
  • 4
  • 5
  • Next Page »

Subscribe

SSL/TLS Certificate Square (250 x 250)

Pearson Education (InformIT)

SSL/TLS Certificate Medium Rectangle (300 x 250)

©2022 CybrAnalytiqa OÜ

  • Content purchasing and syndication