Case Study

How to detect malicious covert communications in today’s encrypted network traffic

How to detect malicious covert  communications in today’s encrypted  network traffic

How to detect malicious covert communications in today’s encrypted network traffic

Pages 12 Pages

THREAT DETECTION CLOUD-SECURITY AND RESPONSE ENTERPRISE How to detect malicious covert communications in today’s encrypted network traffic WHITE PAPER SECURITY THAT THINKSSECURITY THAT THINKS WHITE PAPER : How to detect malicious covert communications in today’s encrypted network traffic 2 TABLE OF CONTENTS Introduction ..................................................................................... 3 Uses of covert communications ............................................................. 3 Why covert communications are difficult to detect ...............................................4 Encryption ..................................................................................... 5 The rise of HTTPS by default .............................................................

Join for free to read