DirectAccess IP-HTTPS SSL and TLS Insecure Cipher Suites | Richard M. Hicks Consulting, Inc.
Sensors | Free Full-Text | Let the Cat out of the Bag: Popular Android IoT Apps under Security Scrutiny | HTML
Directaccess 2012 PCI Compliance - Null Ciphers
What Is the Difference Between SSL/TLS vs. SSH, HTTP vs. HTTPS, and FTP vs. SFTP? | phpGrid - PHP Datagrid
New Attack Against SSL Threatens Secure Connections
SSL/TLS Offloading, Encryption, and Certificates with NGINX
SSL Scanner for SSL/TLS security vulnerabilities - Pentest-Tools.com
Configuring HTTP Server Security
14 Most Common Network Protocols And Their Vulnerabilities - GeeksforGeeks
The most recent SSL security attacks: origins, implementation, evaluation, and suggested countermeasures - El‐Hajj - 2012 - Security and Communication Networks - Wiley Online Library
Entropy | Free Full-Text | A Framework to Secure the Development and Auditing of SSL Pinning in Mobile Applications: The Case of Android Devices | HTML
WSTG - v4.1 | OWASP Foundation
Communications and Data Encryption
SSL Scanner for SSL/TLS security vulnerabilities - Pentest-Tools.com
How Strong is Your SSL/TLS? 6 Simple Steps to Make it Stronger - Black Kite
41 Common Web Application Vulnerabilities… | SecurityScorecard
Debunking the Myths of SSL VPN Security
Frontiers | The Cambridge Cognitive and Psychiatric Assessment Kit (CamCOPS): A Secure Open-Source Client–Server System for Mobile Research and Clinical Data Capture | Psychiatry
Top 10 Vulnerabilities - February 2015 | Qualys Security Blog
Moving Security Enforcement into the Heart of the Network - ppt download