The 2017 TLS Telemetry Report

report / Apr 23, 2018

by David Holmes

Privacy today isn’t just about staying away from prying eyes. The very act of communicating across the Internet with open, non-confidential protocols invites exposure to multiple threat types.

Bleichenbacher Rears its Head Again with the ROBOT Attack

blog / Dec 27, 2017 (MODIFIED: Jan 15, 2018)

by David Holmes

Bleichenbacher attacks will likely continue to pop up until TLS 1.3 is fully adopted, which could take years.

What Happens to Encryption in a Post-Quantum Computing World?

blog / Nov 07, 2017 (MODIFIED: Dec 15, 2017)

by Debbie Walkowski

As the possibility of quantum computing draws nearer, changes to today’s TLS key exchange algorithms will be required.

RSA in a “Pre-Post-Quantum” Computing World

blog / Aug 01, 2017 (MODIFIED: Sept 07, 2017)

by David Holmes

Quantum computing is coming. What should your strategy be today to deal with what’s on the horizon?

How Quantum Computing Will Change Browser Encryption

report / Jul 13, 2017 (MODIFIED: Apr 13, 2018)

by David Holmes

Safeguarding TLS against attack in the quantum computing age will require changes to today’s TLS key exchange algorithms.

The 2016 TLS Telemetry Report

report / Jan 19, 2017 (MODIFIED: Jul 06, 2017)

by David Holmes

In just four short years, encryption estimates have gone from almost non-existent (in the low single digits before 2013) to just over 50% by the end of 2016. How much of a victory is this?

We Expected SSL Everywhere, and It's Well on the Way

article / Aug 02, 2016 (MODIFIED: Jul 06, 2017)

by David Holmes

Malicious actors and eavesdroppers are forcing Internet communication into a single cryptographic protocol: SSL.

stay up to date

Get the latest application threat intelligence from F5 Labs.

There was an error signing up.
Thank you, your email address has been signed up.

Follow us on social media.