2021 TLS Report: How Not to Configure HTTPS

Thank you for your submission.  Your webinar access will be delivered to your inbox shortly. If you have access issues, please email thef5team@f5.com.

Encryption plays an essential role in securing our online lives. Yet with web server misconfigurations, new vulnerabilities, and governments attempting to weaken encryption, it’s never been more difficult to get HTTPS right. In fact, it’s such a problem that the OWASP Top 10 list now has “cryptographic failures” as the second most critical risk to securing web applications.

In the newly released F5 Labs 2021 TLS Telemetry Report, encryption experts dive into the results of their open-source HTTPS scanner, Cryptonice, that shows us how some websites are making progress while others are leaving themselves open to abuse with their TLS configurations. Through TLS fingerprinting they also reveal how the world’s most popular sites may be hiding malicious command and control servers.

Join this webinar to find out why strong HTTPS configurations are so critical to your online security posture. We’ll also explain some of the more important events over the past 18 months, including a look at TLS 1.3, some newly discovered vulnerabilities, and how you can use the Cryptonice tool to evaluate the security of your own HTTPS websites.

In this webinar you'll learn:

How the world’s most popular sites configure HTTPS

The pitfalls of HTTPS and the vulnerabilities that many websites still leave themselves open to

How to use Cryptonice to scan your internal and public facing websites

The current TLS/HTTPS best practices and recommendations


David Warburton
Principal Threat Research Evangelist

Brandon Frelich
Security Solutions Architect