Case Study

How to detect malicious covert communications in today’s encrypted network traffic

How to detect malicious covert communications in today’s encrypted network traffic

Pages 12 Pages

THREAT DETECTION CLOUD-SECURITY AND RESPONSE ENTERPRISE How to detect malicious covert communications in today’s encrypted network traffic WHITE PAPER SECURITY THAT THINKSSECURITY THAT THINKS WHITE PAPER : How to detect malicious covert communications in today’s encrypted network traffic 2 TABLE OF CONTENTS Introduction ..................................................................................... 3 Uses of covert communications ............................................................. 3 Why covert communications are difficult to detect ...............................................4 Encryption ..................................................................................... 5 The rise of HTTPS by default .............................................................

Join for free to read