Analytics
11/15/2012
03:01 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

GlobalSign SSL Configuration Checker Provides Guidance To Reduce Cybercriminals' Ability To Exploit Faulty SSL Configurations

Free online service allows website administrators to confirm that they have correctly configured SSL

BOSTON, MA – Nov. 15, 2012 - GlobalSign, one of the leading providers of SSL Certificates worldwide, today announced availability of its SSL Configuration Checker. This free online service allows website administrators to confirm that they have correctly configured SSL across their websites and receive actionable guidance on how to remediate any faulty or exploitable SSL configurations. Correctly configured SSL improves website performance and strengthens security, allowing organizations to preserve the end-user experience and provide better defense against SSL BEAST, CRIME, and other common and damaging attacks that exploit faulty SSL configurations.

Any organization can use the service by visiting sslcheck.globalsign.com. Once there, users simply enter the URL of the website they want to check. After a brief scan, the user receives a letter grade with a simplified explanation of any issues found in the website's SSL configuration and actionable remediation steps. The SSL Configuration Checker integrates the assessment technology of Qualys SSL Labs, which is focused on auditing the SSL ecosystem, raising awareness, and providing tools and documentation to web site owners so they can improve their SSL implementations. The tool is immediately available in Dutch, English, French, German, Japanese, Russian and Spanish to service the Internet at large.

"Research from Qualys SSL Labs shows that more than 70% of websites using SSL are configured incorrectly which has resulted in poor performance and weakened security. Unfortunately, until now there has been a lack of user-friendly resources to help administrators apply SSL securely," said Ryan Hurst, GlobalSign CTO. "With the availability of SSL Configuration Checker, GlobalSign is adding context to SSL issues by helping companies understand how best to configure SSL to reduce their risk and optimize performance. Our goal is to help all organizations reduce SSL-related risks."

"Configuring SSL properly is an important step in realizing the benefits of SSL. However, it's often hard for administrators to find comprehensive guidance on how to accomplish this goal," said Ivan Ristic, director of engineering at Qualys. "Our work with GlobalSign is addressing this need and making the Internet a safer place for everyone."

"Security doesn't end at the close of a technology sale. Providers need to deliver ongoing support for products and services that allow their customers to maximize the value of their solutions and increase their effectiveness as the threat landscape changes," said Richard Stiennon, noted security author, speaker and founder of IT-Harvest. "As a Certificate Authority, GlobalSign is in the best position to understand website administrators' needs in configuring SSL and remediation of security issues."

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, September 16, 2014
Malicious software is morphing to be more targeted, stealthy, and destructive. Are you prepared to stop it?
Flash Poll
Threat Intel Today
Threat Intel Today
The 397 respondents to our new survey buy into using intel to stay ahead of attackers: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-5700
Published: 2014-09-22
Multiple cross-site scripting (XSS) vulnerabilities in Baby Gekko before 1.2.2f allow remote attackers to inject arbitrary web script or HTML via the (1) id parameter to admin/index.php or the (2) username or (3) password parameter in blocks/loginbox/loginbox.template.php to index.php. NOTE: some o...

CVE-2014-0484
Published: 2014-09-22
The Debian acpi-support package before 0.140-5+deb7u3 allows local users to gain privileges via vectors related to the "user's environment."

CVE-2014-2942
Published: 2014-09-22
Cobham Aviator 700D and 700E satellite terminals use an improper algorithm for PIN codes, which makes it easier for attackers to obtain a privileged terminal session by calculating the superuser code, and then leveraging physical access or terminal access to enter this code.

CVE-2014-3595
Published: 2014-09-22
Cross-site scripting (XSS) vulnerability in spacewalk-java 1.2.39, 1.7.54, and 2.0.2 in Spacewalk and Red Hat Network (RHN) Satellite 5.4 through 5.6 allows remote attackers to inject arbitrary web script or HTML via a crafted request that is not properly handled when logging.

CVE-2014-3635
Published: 2014-09-22
Off-by-one error in D-Bus 1.3.0 through 1.6.x before 1.6.24 and 1.8.x before 1.8.8, when running on a 64-bit system and the max_message_unix_fds limit is set to an odd number, allows remote attackers to cause a denial of service (dbus-daemon crash) or possibly execute arbitrary code by sending one m...

Best of the Web
Dark Reading Radio