The quick answer is that some sort of SSL certificate must be installed on your server(s) if you are not going to perform SSL Offload and want to maintain end-to-end encryption. But this doesn’t have to be the same SSL cert you install in the load balancer if you don’t want. It can be, and […]
Between November 25th and and December 29th platform updates are placed on hold in order to minimize any impact to customers who rely on the holiday season for a significant portion of their revenue. So November and the vast majority of December didn’t see any significant changes released. But we were still working hard behind-the-scenes […]
In this article we will outline the steps required to create an active-active VPN tunnel with BGP dynamic routing between Microsoft Azure and the Total Uptime Cloud Platform. By default, Total Uptime requires your devices (servers) to have internet-routable IPv4 or IPv6 addresses so we can direct traffic to them. By creating VPN tunnels between […]
Internet technology continues to change at a rapid pace, but the fundamentals are the same. Most networks are still using TCP/IP. Networks are designed and analyzed using protocol stacks. And data packet switching is still the lifeblood of the network. In this post, we take a look at some fundamental concepts in networking that the […]
Unless your job encompasses application availability or delivery, you may not be aware of what load balancing is, what it does, or whether it is even a necessary component. As to the last part of that statement, the answer is simple: It is absolutely necessary. In today’s demanding online world, load balancing helps to ensure […]
Recently we discussed the heavy cost of ransomware, both in the form astronomical ransoms that have been paid recently as well as the cost of dealing with the aftermath of an attack. When it comes to most serious cyberattacks, a pound of prevention is worth a pound of cure. The truth is that in most […]
We all know how a computer user interface (UI) works — at least in general terms. Humans interact with digital machines using input devices, and we watch everything real-time on computer monitors. When we think of user input, we usually think of Input devices like a mouse, keyboard, touchscreen, trackball, or pointing stick. But we […]
Your plaintext internet traffic is subject to attack. You already knew this. And it probably won’t surprise you to learn that your encrypted internet traffic is also vulnerable. It’s an unfortunate situation. Carl Herberger, Radware’s VP for Security Solutions, says that the prospect of SSL-based attacks “makes a folly of our existing security infrastructure”. The […]
You use web forms all the time. All across the internet, you are called upon to give certain information about yourself in order to access a site, use an application, or purchase a product. And the truth is most of us have become more open to these kinds of interactions as we have become immersed […]
According to the FBI, ransomware became a billion dollar industry in 2016. That is right, $1 billion. If ransomware were a legitimate industry, it would be the focus of case studies in every business school in the world as its growth is unprecedented. This growth is attributed to four primary reasons. The amount of money […]