Media coverage

Who wins in a world of 100% encrypted traffic?

Sorry, this post has not been published yet, check again later!

November 6, 2017
Published by:

CSO

“Different applications and processes have unique communication patterns," Vectra CTO Oliver Tavakoli writes in CSO. "Attacker traffic often looks different from user traffic, whether it is encrypted or not. Instead of looking inside the encrypted stream, sophisticated math is used to find signals that indicate a threat.”

Read publication

Most recent media coverage

Manufacturing Spending Billions on IoT, But Still Can’t Patch Windows or Remember Passwords

May 21, 2019

Channel Daily News

Read more

Chinese-Made Drones Could Transmit Flight Data Back to Makers, Gov’t, DHS CISA Warns

May 21, 2019

SC Magazine

Read more

DHS Issues Alert on Chinese-Made Drones

May 21, 2019

Infosecurity Magazine

Read more