RESEARCH CONTENT:
For this article in our Royal Holloway security series, the authors provide a brief overview of multiparty computation (MPC) and highlight the benefits of MPC-based bitcoin custody over traditional approaches.
EGUIDE:
This expert e-guide describes the dangerous vulnerabilities that can arise from insecure Secure Socket Layer (SSL) usage, and details essential tips and strategies for properly implementing and configuring SSL in order to ensure Web security.
WHITE PAPER:
Moving your business online provides the convenience and accessibility your customers and partners demand. Learn how to use SSL digital certificates to gain customer trust and potentially increase revenue by adding more online services.
EBOOK:
Can that CA be trusted? Certificate authority risks are many, but since there's no avoiding SSL and TLS, at least for now. Here's how to increase CA security.
WHITE PAPER:
Many IT professionals have little understanding of an extremely important protocol within SSL. This technical white paper provides a quick overview on how Server Gated Cryptography (SGC) affects the encryption levels of a Website to its visitors.
EGUIDE:
In this expert e-guide, uncover 4 key strategies for defending against illegal TLS/SSL-encrypted Web connection interception. Learn how these cyber-attacks work, the challenges of digital certificates, SSL-interception tools, and more by reading on now.
WHITE PAPER:
If you look inside MS Outlook at the security tab or you visit any of your favorite PKI or CA vendors, you will be educated in the need to understand the certificate.
WHITE PAPER:
Although mobile computing offers organizations many competitive advantages, it also entails significant security risks to corporate networks and sensitive corporate data. Read this whitepaper to learn about strong authentication solutions.
EBOOK:
If you're in the market to buy digital certificates, read this guide to learn what features are essential and how to evaluate the available options.
EGUIDE:
This e-guide from SearchSecurity.com explores the issues threatening SSL vulnerabilities and offers advice on how to defend against said risks. View now to learn more!