An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily take advantage of this asymmetric workload. Watch this video to learn how to easily mitigate these attacks.
While smartphones and tablets have stirred the bring-your-own-device crowd to action lately, employees have been bringing their own tech gadgets to work for years. Here's a look at some of the coolest BYOD tech, past and present