Media coverage

Who wins in a world of 100% encrypted traffic?

Sorry, this post has not been published yet, check again later!

November 6, 2017
Published by:

CSO

“Different applications and processes have unique communication patterns," Vectra CTO Oliver Tavakoli writes in CSO. "Attacker traffic often looks different from user traffic, whether it is encrypted or not. Instead of looking inside the encrypted stream, sophisticated math is used to find signals that indicate a threat.”

Read publication

Most recent media coverage

Inside the unusual world of cyber insurance, where ransoms are legally paid to criminal hackers

September 27, 2020

The Telegraph

Read more

Warning: Attackers Exploiting Windows Server Vulnerability

September 25, 2020

Gov Info Security

Read more

6 Things to Know About the Microsoft 'Zerologon' Flaw

September 25, 2020

DarkReading

Read more