New Blog Released: Manually Testing SSL/TLS Weaknesses

01 Jun 2015

Today our Australian consultants have launched a blog on the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols which aim to provide client and server systems with a means of establishing an encrypted communication channel. Though best known for putting the "S" in HTTPS,  their use is not limited to web-based systems; they are also commonly used as a wrapper for other unencrypted services such as FTP.

While SSL has historically been the dominant protocol for securing the Internet, a rash of attacks in recent years has prompted a migration to its successor, TLS. This alone is not enough to guarantee a secure connection, however.

To read the blog in full please click here.

CHECK IT Health Check Service
Cyber Essentials
CESG Certified Service
First - Improving Security Together
BSI ISO 9001 FS 581360
BSI ISO 27001 IS 553326
PCI - Approved Scanning Vendor
NCSC CCSC - Assured Service Provider
ASSURE Cyber Supplier - CAA