<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>https Archives - Vertex Cyber Security</title>
	<atom:link href="https://www.vertexcybersecurity.com.au/tag/https/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.vertexcybersecurity.com.au/tag/https/</link>
	<description>Your Partner in Cyber Security</description>
	<lastBuildDate>Mon, 20 Mar 2023 04:10:37 +0000</lastBuildDate>
	<language>en-AU</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.vertexcybersecurity.com.au/wp-content/uploads/2024/08/cropped-ColoredLogo-32x32.png</url>
	<title>https Archives - Vertex Cyber Security</title>
	<link>https://www.vertexcybersecurity.com.au/tag/https/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>RSA vs ECDSA in HTTPS Certificates.  Which is Best?</title>
		<link>https://www.vertexcybersecurity.com.au/rsa-vs-ecdsa-in-https-certificates/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=rsa-vs-ecdsa-in-https-certificates</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Mon, 06 Mar 2023 01:03:36 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Encryption]]></category>
		<category><![CDATA[ECC VS RSA]]></category>
		<category><![CDATA[ECDSA VS RSA]]></category>
		<category><![CDATA[Elliptic-Curve Cryptography]]></category>
		<category><![CDATA[https]]></category>
		<category><![CDATA[RSA VS ECC]]></category>
		<category><![CDATA[RSA VS ECDSA]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=5264</guid>

					<description><![CDATA[HTTPS (Hypertext transfer protocol secure) Certificates are required for HTTPS websites and they say which encryption algorithm (certificate type) they are using and the public key for the website. The two mainstream encryption algorithms in use for HTTPS are RSA (Rivest–Shamir–Adleman) and ECDSA (Elliptic Curve Digital Signature Algorithm). RSA uses the mathematics of multiplying two prime numbers [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>How to protect data when in transit or at rest</title>
		<link>https://www.vertexcybersecurity.com.au/how-to-protect-data-when-in-transit-or-at-rest/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=how-to-protect-data-when-in-transit-or-at-rest</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Fri, 20 Jan 2023 03:24:05 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Encryption]]></category>
		<category><![CDATA[access controls]]></category>
		<category><![CDATA[backups]]></category>
		<category><![CDATA[data at rest]]></category>
		<category><![CDATA[data in transit]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[https]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=4952</guid>

					<description><![CDATA[The short answer is use Encryption, as it is really good as it allows data to be seen but still protected (if done correctly). The encryption process and algorithm just varies between in transit to at rest. Protecting data when in transit is important to ensure that sensitive information is not intercepted and misused by [&#8230;]]]></description>
		
		
		
			</item>
	</channel>
</rss>
