| Featured Articles As far as we've come with information security, the landscape still feels like the Wild West. Swiftly reacting to intrusive foes may grant you the right to fight another day, but getting ahead of security risks warrants a proactive, strategic plan with structured management oversight. IT professionals are focused on the outside threats that might steal, encrypt or destroy their organization's data. But what about those serious threats that are not from external adversaries or rogue employees, which happen without you even knowing? It's another year of increased spending in IT, says a Gartner report, but the pace may be slowing. Encrypted traffic accounts for a large and growing percentage of all network traffic. While the adoption of SSL, and its successor, Transport Layer Security (TLS), should be cause for celebration - as encryption improves confidentiality and message integrity - it also puts organizations at risk. This is because hackers can leverage encryption to conceal their exploits from security devices that do not inspect SSL traffic. How serious is the threat? Top Stories TMCnet Free Premium Content | | | Advertise With Us | | Become a TMCnet columnist! Become a TMCnet columnist! Want to contribute your expertise to a growing audience of technology professionals? Become a writer, blogger or columnist for the TMCnet Web site and this newsletter. Contact TMCnet Group Editorial Director, Erik Linask, at elinask@tmcnet.com for details. | | |
Tidak ada komentar:
Posting Komentar