Cloud Insidr

Cybersecurity in the Age of the Machine

  • Subscribe!
  • Privacy Policy
  • Legal
  • Contact Us

Join us on Twitter: @CloudInsidr

  • news & alerts
    • events
    • industry analysis
    • industry gossip
    • people
  • cloud, edge & co.
    • AWS
    • administration & orchestration
      • web servers in the cloud
      • mail servers
      • databases
  • cybersec & warfare
    • encryption
  • blockchain
Home Archives for cybersecurity and cyber warfare
Fixing DNS: why you need a Trusted Recursive Resolver and DNS over HTTPS

Cloud Insidr 2018-06-06 Leave a Comment

Fixing DNS: why you need a Trusted Recursive Resolver and DNS over HTTPS

The DNS system is broken. The sorry state of DNS security exposes your server and your end users to a variety of risks. Some of those risks are preventable.

[Read more…]

Filed Under: cybersecurity and cyber warfare, DNS, encryption Tagged With: DNS, DNS checks, DNS over HTTPS, encryption

TLS 1.3 and post-quantum cryptography: unleashing perfect forward secrecy

Cloud Insidr 2018-06-03 Leave a Comment

TLS 1.3 and post-quantum cryptography: unleashing perfect forward secrecy

TLS 1.3 and post-quantum cryptography are subjects of much debate. Upgrade or wait—this is the big question facing administrators and users alike.

There are quite a few reasons to jump onto the TLS 1.3 bandwagon immediately, with or without quantum cryptography. Here is why.  

[Read more…]

Filed Under: cloud, edge and everything in between, cybersecurity and cyber warfare, encryption Tagged With: GDPR, perfect forward secrecy, post-quantum cryptography, TLS 1.3

TLS tune-up: how to restrict Firefox to TLS v1.3 and v1.2 to protect from phishing attacks

Cloud Insidr 2018-06-02 Leave a Comment

TLS tune-up: how to restrict Firefox to TLS v1.3 and v1.2 to protect from phishing attacks

Only two versions of the TLS (Transport Layer Security) protocol can be considered safe under certain circumstances: TLS 1.3 and TLS 1.2. Trying to get your bank alongside everyone else to fix their websites and web applications is a Herculean task; good luck trying. Even so, you can protect TLS connections by modifying the browser configuration.

It is good to know that there is something you can do to protect at least yourself and the other end users on the networks that you oversee from nasty attacks against their TLS connections. In Firefox, you can restrict the browser to “speak” only TLS 1.3 and TLS 1.2 to limit the attack surface and restrict phishing. Here is how to do it.

[Read more…]

Filed Under: cybersecurity and cyber warfare, encryption Tagged With: TLS, TLS 1.2, TLS 1.3, TLS vulnerabilities

How to install the most recent version of OpenSSL on Windows 10 in 64 Bit

Cloud Insidr 2018-06-02 24 Comments

How to install the most recent version of OpenSSL on Windows 10 in 64 Bit

In the age of cyber warfare, being paranoid is the only reasonable attitude and that means, among other things, being paranoid about software updates.

[Read more…]

Filed Under: administration and orchestration, cloud, edge and everything in between, cybersecurity and cyber warfare, encryption, web servers in the cloud Tagged With: cyber security, Linux, OpenSSL, Windows

Attack vectors against TLS, implementation bugs, and how to mitigate TLS vulnerabilities in NGINX

Cloud Insidr 2018-05-21 1 Comment

Attack vectors against TLS, implementation bugs, and how to mitigate TLS vulnerabilities in NGINX

In light of documented TLS vulnerabilities and implementation bugs, understanding known attack vectors becomes a necessity.

[Read more…]

Filed Under: cybersecurity and cyber warfare, encryption, Uncategorized Tagged With: certificate, cipher suites, cryptography, cybersecurity, Diffie-Hellman, encryption, exploits, HTTP/2, HTTPS, mitigation techniques, RSA, TLS, TLS vulnerabilities

  • « Previous Page
  • 1
  • 2
  • 3
  • 4
  • 5
  • …
  • 10
  • Next Page »

Subscribe

SSL/TLS Certificate Square (250 x 250)

Tag Cloud

AWS AWS Billing Dashboard AWS Config AWS Cost Explorer AWS EBS AWS Resource Explorer AWS Tag Editor AWS Trusted Advisor cipher suites cyber security Diffie-Hellman EBS EC2 ECDHE Five Eyes Alliance FLAME HSTS HTTP/2 Java Linux Log4j NGINX NVMe PHP RCE Route 53 SELinux SHA-1 SHA-2 SQL SSL TLS

Pearson Education (InformIT)

SSL/TLS Certificate Medium Rectangle (300 x 250)

©2022 CybrAnalytiqa OÜ

  • Content purchasing and syndication