Nebulous Security Visibility Needs 3 Vantage Points

Most of cybersecurity is based on having visibility of security events and providing protection ranging from preventing the action from being executed as it is being found to alerting the security team of a threat in progress. Endpoint protection, or … Continue reading Nebulous Security Visibility Needs 3 Vantage Points

Encrypted Traffic Analysis Will Be Mandatory Soon

 Although today much of the internet traffic is encrypted, attackers can still exploit it. While the need to examine encrypted traffic is obvious, the way to carry out decryption often remains a conundrum. Decrypting traffic can introduce performance … Continue reading Encrypted Traffic Analysis Will Be Mandatory Soon