During the Infosecurity Europe 2004 show, we caught up with William Orme, Senior Technical Consultant at Whale Communications, and talked to him about SSL VPNs. In this audio session, Mr. Orme discusses the security designs when configuring and setting up SSL VPNs.
The audio session stresses out the need of an extensive pre-deployment audit for the purposes of determing what kind of access should be made possible for diffent type of users.
The audio session is 8:30 minutes long and is streamed in Flash format. If you can't see the controls below, download Flash here.
Posted on 22 July 2014. | A researcher has revealed that Apple has equipped its mobile iOS with several undocumented features that can be used by attackers and law enforcement to access the sensitive data contained on the devices running it.
Posted on 18 July 2014. | A new malware that researchers have dubbed Mayhem is being used to target Linux and Unix web servers and has so far compromised over 1,400 Linux and FreeBSD servers around the world.
Posted on 17 July 2014. | When looking at one popular safe model, G DATA SecurityLabs experts found serious security deficiencies. With a little technical effort, the safe can be hacked and cleared out in a very short time.
Posted on 17 July 2014. | In its third study on unencrypted card data, SecurityMetrics found that 63.86% of businesses store the unencrypted 16-digit sequence on the front of credit cards, also known as the Primary Account Number.