Analytics
11/15/2012
03:01 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

GlobalSign SSL Configuration Checker Provides Guidance To Reduce Cybercriminals' Ability To Exploit Faulty SSL Configurations

Free online service allows website administrators to confirm that they have correctly configured SSL

BOSTON, MA – Nov. 15, 2012 - GlobalSign, one of the leading providers of SSL Certificates worldwide, today announced availability of its SSL Configuration Checker. This free online service allows website administrators to confirm that they have correctly configured SSL across their websites and receive actionable guidance on how to remediate any faulty or exploitable SSL configurations. Correctly configured SSL improves website performance and strengthens security, allowing organizations to preserve the end-user experience and provide better defense against SSL BEAST, CRIME, and other common and damaging attacks that exploit faulty SSL configurations.

Any organization can use the service by visiting sslcheck.globalsign.com. Once there, users simply enter the URL of the website they want to check. After a brief scan, the user receives a letter grade with a simplified explanation of any issues found in the website's SSL configuration and actionable remediation steps. The SSL Configuration Checker integrates the assessment technology of Qualys SSL Labs, which is focused on auditing the SSL ecosystem, raising awareness, and providing tools and documentation to web site owners so they can improve their SSL implementations. The tool is immediately available in Dutch, English, French, German, Japanese, Russian and Spanish to service the Internet at large.

"Research from Qualys SSL Labs shows that more than 70% of websites using SSL are configured incorrectly which has resulted in poor performance and weakened security. Unfortunately, until now there has been a lack of user-friendly resources to help administrators apply SSL securely," said Ryan Hurst, GlobalSign CTO. "With the availability of SSL Configuration Checker, GlobalSign is adding context to SSL issues by helping companies understand how best to configure SSL to reduce their risk and optimize performance. Our goal is to help all organizations reduce SSL-related risks."

"Configuring SSL properly is an important step in realizing the benefits of SSL. However, it's often hard for administrators to find comprehensive guidance on how to accomplish this goal," said Ivan Ristic, director of engineering at Qualys. "Our work with GlobalSign is addressing this need and making the Internet a safer place for everyone."

"Security doesn't end at the close of a technology sale. Providers need to deliver ongoing support for products and services that allow their customers to maximize the value of their solutions and increase their effectiveness as the threat landscape changes," said Richard Stiennon, noted security author, speaker and founder of IT-Harvest. "As a Certificate Authority, GlobalSign is in the best position to understand website administrators' needs in configuring SSL and remediation of security issues."

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Threat Intel Today
Threat Intel Today
The 397 respondents to our new survey buy into using intel to stay ahead of attackers: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-4692
Published: 2015-07-27
The kvm_apic_has_events function in arch/x86/kvm/lapic.h in the Linux kernel through 4.1.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by leveraging /dev/kvm access for an ioctl call.

CVE-2015-1840
Published: 2015-07-26
jquery_ujs.js in jquery-rails before 3.1.3 and 4.x before 4.0.4 and rails.js in jquery-ujs before 1.0.4, as used with Ruby on Rails 3.x and 4.x, allow remote attackers to bypass the Same Origin Policy, and trigger transmission of a CSRF token to a different-domain web server, via a leading space cha...

CVE-2015-1872
Published: 2015-07-26
The ff_mjpeg_decode_sof function in libavcodec/mjpegdec.c in FFmpeg before 2.5.4 does not validate the number of components in a JPEG-LS Start Of Frame segment, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via craft...

CVE-2015-2847
Published: 2015-07-26
Honeywell Tuxedo Touch before 5.2.19.0_VA relies on client-side authentication involving JavaScript, which allows remote attackers to bypass intended access restrictions by removing USERACCT requests from the client-server data stream.

CVE-2015-2848
Published: 2015-07-26
Cross-site request forgery (CSRF) vulnerability in Honeywell Tuxedo Touch before 5.2.19.0_VA allows remote attackers to hijack the authentication of arbitrary users for requests associated with home-automation commands, as demonstrated by a door-unlock command.

Dark Reading Radio
Archived Dark Reading Radio
What’s the future of the venerable firewall? We’ve invited two security industry leaders to make their case: Join us and bring your questions and opinions!