The Latest in IT Security

How attackers can take advantage of encrypted tunnels

02
Oct
2017
How attackers can take advantage of encrypted tunnels

tunnel-light

“As organizations encrypt more traffic and machine identity usage skyrockets, so do the number of opportunities for cybercriminals,” said Nick Hunter, senior technical manager for Venafi. “Any type of encrypted tunnel can be exploited in a cyber attack, and most organizations manage hundreds of thousands of keys and certificates each day. This use will only grow, and the dramatic increase of keys and certificates will only make the job of securing encrypted tunnels more difficult. Ultimately, organizations must secure their encrypted tunnels or risk being at the mercy of cyber attackers.”

Venafi security experts point out that without proper insight into encrypted tunnels, cyber attackers can use them against businesses in five ways.

Read More

Leave a reply


Categories

FRIDAY, OCTOBER 20, 2017

Featured

Archives

Latest Comments

Social Networks