I was wondering how you were going to do this. Then you mentioned, trust the certificate. Trust is paramount to any TLS interception. But overall nice and informative. Thank you
Thank you so much for this demo video! Thank you for making it clear and concise! I am an AWS student studying for my Solutions Architect exam and this video makes Encryption and TLS implementation much clearer! Thanks again and Cheers!!
Nice demo. But I'm missing a use case! E.g. filtering an SQL injection attempt matching on 'SELECT' or any other SQL command. Or matching on any usually encrypted data.
I was wondering how you were going to do this. Then you mentioned, trust the certificate. Trust is paramount to any TLS interception. But overall nice and informative. Thank you
Thank you so much for this demo video! Thank you for making it clear and concise! I am an AWS student studying for my Solutions Architect exam and this video makes Encryption and TLS implementation much clearer! Thanks again and Cheers!!
Nice demo. But I'm missing a use case! E.g. filtering an SQL injection attempt matching on 'SELECT' or any other SQL command. Or matching on any usually encrypted data.
Very good presentation. I'd suggest add a simple sequence diagram before or after the configuration to clarify the process.
Very strong presentation.
Thank you 🙌