PDF REPORT: The Threat To Our Cybersecurity Foundation
- Written by Cyber Policy Magazine
- Published in Cyber Security PDF Downloads
Enterprises rely on tens of thousands of keys and certificates as the foundation of trust for their websites, virtual machines, mobile devices, and cloud servers. The technology was adopted to help solve the original Internet security problem of knowing what is safe and private.
From online banking, secure communications and mobile applications to the Internet of Things, everything IP-based depends upon a key and certificate to create a trusted and secure connection. But unprotected keys and certificates are being misused by cybercriminals to hide in encrypted traffic, spoof websites, deploy malware, elevate their privileges, and steal data.
Deployed technologies like endpoint protection, advanced threat protection, next generation firewalls, behavioural analytics, intrusion detection systems (IDS) and data loss prevention (DLP) are fundamentally flawed because they cannot determine which keys and certificates are good or bad, friend or foe. As a result, one consequence is that they are unable to inspect the vast majority of encrypted network traffic. This leaves gaping holes in enterprise security defences. Cybercriminals are taking advantage of these security blind spots and are using unprotected keys and certificates to hide in encrypted traffic and circumvent security controls.
Download the report: 2016 CIO Study Results – The Threat to Our Cybersecurity Foundation
Related items
- PDF REPORT: Counting The Cost Cyber Exposure Decoded
- Fitch: Rapid Growth in Cyber Insurance Would Be Credit-Negative
- PDF REPORT: Safety and Shipping Review 2016
- Chubb's Expanded Global Cyber Practice Launches Service To Help Firms Combat Ransomware Attacks
- Two-Thirds Of Business Decision Makers Expect To Suffer An Information Security Breach