際際滷shows by User: shainsingh / http://www.slideshare.net/images/logo.gif 際際滷shows by User: shainsingh / Wed, 06 Mar 2019 03:02:12 GMT 際際滷Share feed for 際際滷shows by User: shainsingh Decrypting and Selectively Inspecting Modern Traffic /slideshow/decrypting-and-selectively-inspecting-modern-traffic/134800174 melbournetechxchange-decryptingandselectivelyinspectingmoderntrafficwithf5sslorchestratormar2019-190306030212
Some Security equipment vendors claim that modern Perfect Forward Secrecy (PFS)-encrypted traffic cannot be decrypted inline. Alternative techniques must be used to locate malware hiding in such encrypted traffic, such as using Artificial Intelligence to guess if a security threat is present.]]>

Some Security equipment vendors claim that modern Perfect Forward Secrecy (PFS)-encrypted traffic cannot be decrypted inline. Alternative techniques must be used to locate malware hiding in such encrypted traffic, such as using Artificial Intelligence to guess if a security threat is present.]]>
Wed, 06 Mar 2019 03:02:12 GMT /slideshow/decrypting-and-selectively-inspecting-modern-traffic/134800174 shainsingh@slideshare.net(shainsingh) Decrypting and Selectively Inspecting Modern Traffic shainsingh Some Security equipment vendors claim that modern Perfect Forward Secrecy (PFS)-encrypted traffic cannot be decrypted inline. Alternative techniques must be used to locate malware hiding in such encrypted traffic, such as using Artificial Intelligence to guess if a security threat is present. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/melbournetechxchange-decryptingandselectivelyinspectingmoderntrafficwithf5sslorchestratormar2019-190306030212-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Some Security equipment vendors claim that modern Perfect Forward Secrecy (PFS)-encrypted traffic cannot be decrypted inline. Alternative techniques must be used to locate malware hiding in such encrypted traffic, such as using Artificial Intelligence to guess if a security threat is present.
Decrypting and Selectively Inspecting Modern Traffic from Shain Singh
]]>
122 1 https://cdn.slidesharecdn.com/ss_thumbnails/melbournetechxchange-decryptingandselectivelyinspectingmoderntrafficwithf5sslorchestratormar2019-190306030212-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
How to Gain Visibility into Encrypted Threats /slideshow/how-to-gain-visibility-into-encrypted-threats/133215792 f5apcjwebinarnovember2018-howtogainvisibilityintoencryptedthreats-190225130941
Encrypting data-in-transit with SSL/TLS is standard practice among organisations today. Important security initiatives, such as built-in web browser warnings and stronger legislative GDPR changes, have significantly improved privacy awareness and helped to prevent data breaches. However, cybercriminals commonly hide threats within encrypted payloads and use encrypted channels to propagate malware and exfiltrate data, knowing they can bypass traditional security inspection solutions.]]>

Encrypting data-in-transit with SSL/TLS is standard practice among organisations today. Important security initiatives, such as built-in web browser warnings and stronger legislative GDPR changes, have significantly improved privacy awareness and helped to prevent data breaches. However, cybercriminals commonly hide threats within encrypted payloads and use encrypted channels to propagate malware and exfiltrate data, knowing they can bypass traditional security inspection solutions.]]>
Mon, 25 Feb 2019 13:09:41 GMT /slideshow/how-to-gain-visibility-into-encrypted-threats/133215792 shainsingh@slideshare.net(shainsingh) How to Gain Visibility into Encrypted Threats shainsingh Encrypting data-in-transit with SSL/TLS is standard practice among organisations today. Important security initiatives, such as built-in web browser warnings and stronger legislative GDPR changes, have significantly improved privacy awareness and helped to prevent data breaches. However, cybercriminals commonly hide threats within encrypted payloads and use encrypted channels to propagate malware and exfiltrate data, knowing they can bypass traditional security inspection solutions. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/f5apcjwebinarnovember2018-howtogainvisibilityintoencryptedthreats-190225130941-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Encrypting data-in-transit with SSL/TLS is standard practice among organisations today. Important security initiatives, such as built-in web browser warnings and stronger legislative GDPR changes, have significantly improved privacy awareness and helped to prevent data breaches. However, cybercriminals commonly hide threats within encrypted payloads and use encrypted channels to propagate malware and exfiltrate data, knowing they can bypass traditional security inspection solutions.
How to Gain Visibility into Encrypted Threats from Shain Singh
]]>
75 1 https://cdn.slidesharecdn.com/ss_thumbnails/f5apcjwebinarnovember2018-howtogainvisibilityintoencryptedthreats-190225130941-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-shainsingh-48x48.jpg?cb=1729552113 shain.io https://cdn.slidesharecdn.com/ss_thumbnails/melbournetechxchange-decryptingandselectivelyinspectingmoderntrafficwithf5sslorchestratormar2019-190306030212-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/decrypting-and-selectively-inspecting-modern-traffic/134800174 Decrypting and Selecti... https://cdn.slidesharecdn.com/ss_thumbnails/f5apcjwebinarnovember2018-howtogainvisibilityintoencryptedthreats-190225130941-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/how-to-gain-visibility-into-encrypted-threats/133215792 How to Gain Visibility...