Skip to main content
banner image
venafi logo

Can Cisco Tip the Scales on Encrypted Traffic Threats?

Can Cisco Tip the Scales on Encrypted Traffic Threats?

encrypted malware
July 5, 2017 | Emil Hanscom

In late June, Cisco announced a new machine-learning model called Encrypted Traffic Analytics (ETA). According to the hardware giant, ETA will allow businesses to detect malware activity in encrypted traffic.

According to a company blog post by Jason Deign: “Encryption is a valuable ally in maintaining privacy. It keeps our data safe from prying eyes. It stops people robbing our credit card details, our app usage habits, and our passwords…. [However], encryption brings a bit of a double-edged sword -- the bad guys can use it too. Encryption can hide malware just as well as it can hide your own secrets. And that opened a whole can of worms (and Trojans, and viruses) for IT bosses.”

Encryption is a vital and power security tool. But, it’s absolutely true that cyber criminals are finding ways to hide attacks inside the very encrypted traffic that is designed to protect our privacy. This will only get worse as the drive for encryption continues to explode: a recent study from A10 Networks found that 41 percent of cyber attacks used encryption to evade detection. Cisco’s announcement is just the latest response to our changing threat landscape.

“It’s encouraging to see Cisco acknowledging the risks of threats that hide in encrypted traffic,” says Kevin Bocek, chief security strategist for Venafi. “However, there is still much more to accomplish.” 

Even though industry analysts estimate the vast majority of cyber attacks will use SSL/TLS by 2020, very few organizations actively devote resources to protecting against these kinds of threats. An unfortunate side effect of this behavior is that the threats that hide in encrypted traffic dramatically reduce the effectiveness of most cyber security technology investments.

“It is absolutely essential for organizations to inspect cross-network/cross-cloud SSL/TLS traffic in order to protect against threats utilizing encrypted traffic,” says Bocek. “However, most IT and security professionals don’t realize how blind spots in encrypted traffic impact the security technologies they depend on to protect their business. Without proper visibility, many security solutions are useless against the increasing number of attacks hiding in encrypted traffic.”

Ultimately, we must develop regulatory and best practice advice on the proper ways to protect encryption. Simply pushing for its usage is not enough. “Federal agencies have been directed to use HTTPS with digital certificates on public webservers since the end of 2016,” concludes Bocek. “But, they were never informed about the new security risks created by increasing encrypted traffic.”

What do you think about Cisco’s announcement? How does your organization respond to risks hiding in encrypted traffic?

Like this blog? We think you will love this.
Featured Blog

What Is IP Spoofing?

What is IP Spoofing?

Read More
Subscribe to our Weekly Blog Updates!

Join thousands of other security professionals

Get top blogs delivered to your inbox every week

See Popular Tags

You might also like

TLS Machine Identity Management for Dummies

TLS Machine Identity Management for Dummies

Certificate-Related Outages Continue to Plague Organizations
White Paper

CIO Study: Certificate-Related Outages Continue to Plague Organizations

About the author

Emil Hanscom
Emil Hanscom

Emil is the Public Relations Manager at Venafi. Passionate about educating the global marketplace about infosec and machine-identity issues, they have consistently grown Venafi's global news coverage year over year.

Read Posts by Author
get-started-overlay close-overlay cross icon
get-started-overlay close-overlay cross icon
Venafi Risk assessment Form Image

Sign up for Venafi Cloud

Venafi Cloud manages and protects certificates

* Please fill in this field Please enter valid email address
* Please fill in this field Password must be
At least 8 characters long
At least one digit
At last one lowercase letter
At least one uppercase letter
At least one special character
* Please fill in this field
* Please fill in this field
* Please fill in this field

End User License Agreement needs to be viewed and accepted

Already have an account? Login Here

get-started-overlay close-overlay cross icon

How can we help you?

Thank you!

Venafi will reach out to you within 24 hours. If you need an immediate answer please use our chat to get a live person.

In the meantime, please explore more of our solutions

Explore Solutions

learn more

Email Us a Question

learn more

Chat With Us

learn more