SSL/TLS Certificate Toolkits: A Hot Commodity on the Dark Web

| March 6, 2019

article image
“One very interesting aspect of this research was seeing TLS certificates packaged with wrap-around services – such as web design services – in order to give attackers immediate access to high levels of online credibility and trust,” said security researcher and report author David Maimon, associate professor and director of the Evidence-based Cybersecurity Research Group. “It was surprising to discover how easy and inexpensive it is to acquire extended validation certificates, along with all the documentation needed to create very credible shell companies without any verification information.”

Spotlight

ECI Telecom

ECI delivers ELASTIC network solutions to service providers, utilities and data center/cloud providers worldwide. ECI's ELASTIC network solutions ensure open, future-proof, and secure communications.

OTHER ARTICLES

5G Standalone: What's So Exciting About It?

Article | May 20, 2021

The much-anticipated 5G Standalone has arrived. T-Mobile is the first to launch it in the USA, covering 250 million people across 7,500 cities and towns, including rural areas. China Mobile is the only other service provider to launch it in Hong Kong. Overall, 58 operators are currently investing (November 2020) in 5G SA, including those who have launched. 5G SA makes a break from 5G non-standalone by integrating the evolved packet core or the signaling brain of the 5G network, which controls the network's devices. It prepares the groundwork for new services unique to this generation of networks, such as network slicing to customize enterprise services across multiple networks.

Read More

Unify NetOps and SecOps with SD-WAN Cloud Management

Article | March 4, 2020

CIOs know that ubiquitous connectivity across domains—campus, branch, cloud, and edge, wired or wireless—is a baseline requirement for building a digital enterprise. But, as CISOs know, as the network fabric spreads to encompass devices and location-agnostic data and compute resources, the need for end-to-end integrated security is equally paramount. Add in the necessity to continuously monitor and maintain application performance throughout campus and branch and edge locations and you create an enormous workload for NetOps and SecOps teams that are simultaneously dealing with static CapEx and OpEx budgets. Often the result is a tug-of-war between the teams: one striving to keep the network optimized for performance and availability, the other striving to keeping data, applications, and devices secure.

Read More

Keeping Innovation RuralStar Pro, Connecting the Unconnected

Article | July 1, 2021

According to the GSMA 2020 report, 600 million people do not have mobile network coverage and 3.4 billion people do not have mobile Internet access. Most of these areas are remote, difficult to obtain site transmission and power, and high infrastructure costs. As a result, the return of investment (ROI) of traditional solutions is usually as high as 8 to 10 years. Operators are not willing to deploy networks.

Read More

Five Broadcasting Technology Transition Factors to Consider

Article | March 4, 2020

You may be asking yourself, what will the broadcasting industry look like a year from now or five years into the future? How do I successfully transition my broadcast technology to keep pace? Here are five important factors to consider when reshaping your broadcasting technology in this time of rapid change. After all, the decisions made now will determine the technical environment we live with for years to come. If you’re considering broadcast technology transition, begin by asking the question, how should this workflow exist in the future? Does it make sense to keep doing what we do with no changes to operational assumptions? How long do we expect the best practices implemented today to remain best practices?

Read More

Spotlight

ECI Telecom

ECI delivers ELASTIC network solutions to service providers, utilities and data center/cloud providers worldwide. ECI's ELASTIC network solutions ensure open, future-proof, and secure communications.

Events