During the Infosecurity Europe 2004 show, we caught up with William Orme, Senior Technical Consultant at Whale Communications, and talked to him about SSL VPNs. In this audio session, Mr. Orme discusses the security designs when configuring and setting up SSL VPNs.
The audio session stresses out the need of an extensive pre-deployment audit for the purposes of determing what kind of access should be made possible for diffent type of users.
The audio session is 8:30 minutes long and is streamed in Flash format. If you can't see the controls below, download Flash here.
Posted on 1 October 2014. | Members of a computer hacking ring have been charged with breaking into computer networks of prominent technology companies and the US Army and stealing more than $100 million in intellectual property and other proprietary data.
Posted on 1 October 2014. | Researchers looking into the mobile malware attack directed against Hong Kong protesters using Android devices have discovered that the attackers can also target iOS device owners - if the device is jailbroken.
Posted on 29 September 2014. | As vendors scramble to issue patches for the GNU Bash Shellshock bug and companies rush to implement them, attackers around the world are probing systems for the hole it opens.
Posted on 25 September 2014. | In this interview, Ravi Ithal, Chief Architect at Netskope, discusses the top threats to cloud security and how they are changing the way we're using the cloud. e also talks about how the power of the cloud influences the agility of a modern security architecture.