Skip to content ↓ | Skip to navigation ↓

A new, high-profile encryption vulnerability was discovered in late May. Logjam involves a man-in-the-middle attack that could be implemented to weaken encryption between clients and servers. Because this vulnerability targets legacy encryption standards LogJam shares many qualities with FREAK.

Why are attackers targeting encryption standards?

Listen to this latest Security Slice podcast and hear Tyler Reguly and Tim Erlin discuss how Logjam works, which steps organizations should take to upgrade their encryption standards, and why consumers should configure their web-browsers to protect their data.

CLICK HERE TO LISTEN TO THE PODCAST

 

MORE PODCASTS