CIO News Hubb
Advertisement
  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact
No Result
View All Result
  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact
No Result
View All Result
CIO News Hubb
No Result
View All Result
Home Information Security

Decrypt As If Your Security Depends on It

admin by admin
April 6, 2022
in Information Security
585
SHARES
3.2k
VIEWS
Share on FacebookShare on Twitter


Encryption has reached near-full adoption by internal teams hoping to implement stronger security and privacy practices. Simultaneously, attackers are using the same mechanisms to hide their malicious activity from the defender’s line of sight.

According to the Ponemon Institute’s 2021 Global Encryption Trends Study, 50% of organizations have an encryption plan consistently applied across their entire environment—up from around 40% in 2015 and 25% in 2010. While encryption is providing an increasingly critical defensive layer against tampering and eavesdropping, it is also an increasing threat as demonstrated by the 260% increase in encrypted attacks reported by Zscaler.

ExtraHop Senior Technical Marketing Manager Jamie Moles joined Enterprise Security Weekly to discuss the various techniques attackers are using to cover their tracks using encryption, addressed common objections about decryption, and made the case for decryption as a path toward faster, more confident defense.

He shared a demonstration of how the ExtraHop Reveal(x) network detection and response platform securely decrypts network traffic to successfully halt a breach in progress.

“With strategic decryption, you are only decrypting things you have encrypted — that for which you have the key,” Jaimie said. “That way, you preserve privacy. Decrypting traffic you control in your own private network is a perfectly legitimate thing to do.”

This is about decrypting traffic for the express purpose of looking for threats against your organization. That traffic can hide risk and you want to have insight into it., he added.

This segment is sponsored by ExtraHop Networks. Visit https://securityweekly.com/extrahop to learn more about them!



Source link

Previous Post

How to use AWS Security Hub and Amazon OpenSearch Service for SIEM

Next Post

Attackers Spoof WhatsApp Voice-Message Alerts to Steal Info

Related Posts

Information Security

Yes, Containers Are Terrific, But Watch the Security Risks

by admin
May 24, 2022
Information Security

Zero Trust for Data Helps Enterprises Detect, Respond and Recover from Breaches

by admin
May 23, 2022
Information Security

An Interview with a White Hat Hacker

by admin
May 23, 2022
Information Security

Cisco Issues Patch for New IOS XR Zero-Day Vulnerability Exploited in the Wild

by admin
May 23, 2022
Information Security

APTs Overwhelmingly Share Known Vulnerabilities Rather Than Attack O-Days

by admin
May 22, 2022
Next Post

Attackers Spoof WhatsApp Voice-Message Alerts to Steal Info

Leave Comment

Recommended

JPMorgan’s UK digital retail bank reaches half-million customer mark

May 24, 2022

Set innovation free and make great ideas a reality

May 24, 2022

Japan Airlines: digitally re-imagining the air passenger experience

May 24, 2022

Yes, Containers Are Terrific, But Watch the Security Risks

May 24, 2022

Learn to work with the Office 365 unified audit log

May 23, 2022

Zero Trust for Data Helps Enterprises Detect, Respond and Recover from Breaches

May 23, 2022

© 2022 CIO News Hubb All rights reserved.

Use of these names, logos, and brands does not imply endorsement unless specified. By using this site, you agree to the Privacy Policy.

Navigate Site

  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact

Newsletter Sign Up

No Result
View All Result
  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact

© 2022 JNews - Premium WordPress news & magazine theme by Jegtheme.