It’s often claimed that SSL/TLS vulnerabilities represent the web’s weakest security link. This TechTarget paper examines the highest profile attack vectors, the exposures they cause, and the resulting fallout associated with each.
Download now and discover why:
- SSL/TLS certificates need to be at least 2048-bit RSA or 256-bit ECC
- The only secure, standard hash algorithm is SHA-2
- Root certificates must be heavily defended by the CA
- The security of systems storing and using private SSL/TLS keys must also be tightly guarded