Account
Please wait, authorizing ...

Don't have an account? Register here today.

×

Nearly half of cyberattacks used malware hidden in encrypted traffic

Latin America. One of the main consequences of  the increasing use of encryption technology is the increase in cyber attacks, highlights A10 Networks, a leader in application network and security technology, in a new study on network security. 

Under the title "Hidden Threats in Encrypted Traffic: A Study of North America & EMEA,  the report, conducted in collaboration with the Ponemon Institute, on a sample of 1,023 IT and security professionals based in North America and Europe, it captures the overwhelming challenges faced by these managers to prevent and detect hidden attacks on encrypted traffic inside and outside their organizations' networks. 

80% of participants admit that their organizations have been victims of a cyber attack or a malicious insider during the past year, and almost half recognize that attackers use the encryption of communications to avoid detection. However, 47% cite a lack of adequate security tools as the main reason for not inspecting decrypted web traffic, followed closely by insufficient resources and degradation of network performance (both 45%).

While 75% of respondents understand the risk posed to their networks by malware hidden in their encrypted traffic, about two-thirds of them think their company is not prepared to detect malicious SSL traffic, leaving them vulnerable to costly data breaches and loss of intellectual property. 

- Publicidad -

Among the IT professionals who responded to the survey, the highest percentage work in the Financial sector, followed by those who work in the area of Health and Public Sector; three of the sectors that most need to protect their sensitive data.

Moreover, the threat is expected to worsen as the volume of encrypted data traffic continues to grow. In addition, the majority of respondents predict that over the next year attackers will increasingly use encryption to evade detection controls. Many companies may be surprised and their security solutions end up collapsed under the weight of vulnerabilities embedded in SSL traffic.

"IT managers need to think more strategically," says Dr. Chase, Cunningham, Director of Cyber Operations at A10 Networks. "Like the good guys, bad guys look for an ROI, but without striving to get it. For this reason, and instead of focusing on doing things right one hundred percent of the time, IT managers could be more effective, if they sometimes proceeded more strategically and took advantage of the best technology available. Cyber security is equivalent to a zombie marathon: if you avoid being the slowest to outperform zombies, you minimize the risk."

"The study, The Hidden Threats in Encrypted Traffic, sheds light on important facts related to the malicious threats that lurk in today's corporate networks," said Dr. Larry Ponemon, President and Founder of the Ponemon Institute. "Our goal is to help organizations understand the risks to help them more effectively address vulnerabilities that loom over their networks."

Santiago Jaramillo
Author: Santiago Jaramillo
Editor
Comunicador social y periodista con más de 15 años de trayectoria en medios digitales e impresos, Santiago Jaramillo fue Editor de la revista "Ventas de Seguridad" entre 2013 y 2019.

No thoughts on “Nearly half of cyberattacks used malware hidden in encrypted traffic”

• If you're already registered, please log in first. Your email will not be published.

Leave your comment

In reply to Some User
Suscribase Gratis
SUBSCRIBE TO OUR ENGLISH NEWSLETTER
DO YOU NEED A SERVICE OR PRODUCT QUOTE?
LATEST INTERVIEWS

Webinar: NxWitness el VMS rápido fácil y ultra ligero

Webinar: Por qué elegir productos con certificaciones de calidad

Por: Eduardo Cortés Coronado, Representante Comercial - SECO-LARM USA INC La importancia de utilizar productos certificados por varias normas internacionales como UL , Ul294, CE , Rosh , Noms, hacen a tus instalciones mas seguras y confiables además de ser un herramienta más de venta que garantice nuestro trabajo, conociendo qué es lo que certifica cada norma para así dormir tranquilos sabiendo que van a durar muchos años con muy bajo mantenimiento. https://www.ventasdeseguridad.com/2...

Webinar: Anviz ONE - Solución integral para pymes

Por: Rogelio Stelzer, Gerente comercial LATAM - Anviz Presentación de la nueva plataforma Anviz ONE, en donde se integran todas nuestras soluciones de control de acceso y asistencia, video seguridad, cerraduras inteligentes y otros sensores. En Anviz ONE el usuario podrá personalizar las opciones según su necesidad, de forma sencilla y desde cualquier sitio que tenga internet. https://www.ventasdeseguridad.com/2...

Webinar: Aplicaciones del IoT y digitalización en la industria logística

Se presentarán los siguientes temas: • Aplicaciones del IoT y digitalización en la industria logística. • Claves para decidir el socio en telecomunicaciones. • La última milla. • Nuevas estrategias de logística y seguimiento de activos sostenibles https://www.ventasdeseguridad.com/2...

Sesión 5: Milestone, Plataforma Abierta que Potencializa sus Instalaciones Manteniéndolas Protegidas

Genaro Sanchez, Channel Business Manager - MILESTONE https://www.ventasdeseguridad.com/2...
Load more...
SITE SPONSORS










LATEST NEWSLETTER
Latest Newsletter