Abstract
As efforts to more securely protect the world's privacy and data continue to improve, with the introduction of stricter compliance regulations and the deployment of increasingly complex network infrastructures, so too has enterprise adoption of and reliance on encryption. Cryptographic encryption protocols, namely secure sockets layer (SSL) and its successor, transport layer security (TLS), were estimated by Gartner to be implemented across 80% of enterprise web traffic in 2019, and the Ponemon Institute found that 43% of organisations had a consistent, enterprise-wide encryption strategy in place in 2018. 1,2 As efforts to more securely protect the world's privacy and data continue to improve, so too has enterprise adoption of and reliance on encryption. However, threat actors have also started to leverage encryption and are hiding their nefarious activities among regular encrypted traffic, making malicious packets nearly impossible to detect. Fortunately, by using AI, enterprises can achieve a quicker and more accurate analysis of all traffic on their network to check for beaconing behaviour, explains Yessine Borchani of Barac.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.