Remove author david-bisson
article thumbnail

How Secure Shell (SSH) Keys Work

Security Boulevard

But SSH protocol version 1 is limited in its support of message authorization codes, compression algorithms, and the algorithms necessary for key exchanges. David Bisson. As Justin Elingwood of DigitalOcean explains , SSH encrypts data exchanged between two parties using a client-server model. Related blogs.

article thumbnail

Self-Signed Certificates: Cybercriminals Are Turning This Strength into a Vulnerability

Security Boulevard

With signed certificates, a trusted Certificate Authority must verify the certificate applicant's domain ownership and identity information, whereas anyone can generate a self-signed certificate without having to submit through this means of authentication. . David Bisson. Code Signing Certificates: A Dark Web Best Seller.

Banking 97
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Rogue Certificates and Shadow IT: The Underbelly of Digital Certificate Growth

Security Boulevard

Just as a reminder , a rogue certificate is a legitimate certificate issued by a trusted Certificate Authority (CA) that someone has succeeded in compromising. David Bisson. It may also be the result of a trusted CA issuing a legitimate certificate to an incorrect entity. Related Posts. Venafi Trust Protection Platform.

article thumbnail

5 Components of the Kubernetes Control Plane that Demand Special Attention in Your Security Strategy

Security Affairs

Once they’ve implemented that security measure, they can use RBAC authorization to further limit who has access to the cluster. About the Author: David Bisson is an information security writer and security junkie. They can enable this feature specifically via the kube-apiserver. What it is.

article thumbnail

How to Extend Security Across Your Kubernetes Infrastructure

Security Affairs

By David Bisson. They can do so by enabling kubelet authorization and authentication. How to enhance the security across a Kubernetes Infrastructure and mitigate the risk of cyber attacks. The security risks surrounding containers are well-known. Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->.

Risk 74
article thumbnail

Why Focusing on Container Runtimes Is the Most Critical Piece of Security for EKS Workloads?

Security Affairs

About the Author: David Bisson is an information security writer and security junkie. The guidance provided above can help admins ensure container runtime security in Amazon EKS. For more information about other aspects of Amazon EKS security, click here.