An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily take advantage of this asymmetric workload. Watch this video to learn how to easily mitigate these attacks.
Cybercriminals have learned how to exploit the digital trust that cryptographic keys and certificates provide to gain trusted status and infiltrate servers, applications and clouds. The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities.