encryption

June 23, 2017

SECURITY

Detecting Encrypted Malware Traffic (Without Decryption)

Introduction Over the past 2 years, we have been systematically collecting and analyzing malware-generated packet captures. During this time, we have observed a steady increase in the percentage of malware samples using TLS-based encryption to evade detection. In August 2015, 2.21% of the malware sa…

June 22, 2017

SECURITY

What is the Body Language of Your Encrypted Network Traffic Really Saying?

Imagine this scenario – you walk into a meeting room with a colleague and they are sitting at the table with their arms crossed. You immediately think to yourself, this meeting is not going to go well, this person is already displeased with me and I have not said anything yet. However, you are makin…

December 2, 2016

SP360: SERVICE PROVIDER

From DRM technology to a working content protection system

When it comes to over-the-top (OTT) video distribution, we are seeing many of our customers opt for a multi-DRM approach. This means utilizing the DRM client that is pre-integrated into the viewing platform instead of installing a DRM. These natively available DRMs – the native DRMs – are developed…

June 20, 2016

GOVERNMENT

Cisco Successfully Demonstrated Secure Mobile Device at Trident Spectre 2016

Last month Cisco was thrilled to participate in the Department of Defense (DoD) Trident Spectre 2016 annual exercise conducted at Joint Expeditionary Base Little Creek-Fort Story, VA. Trident Spectre is an annual event for special operations, intelligence, interagency, and law-enforcement personnel…

March 4, 2016

SECURITY

Walking the Tightrope of Security and Usability

Here at the RSA Conference 2016, the theme this year is Connect to Protect. It is a fitting theme for a gathering of security professionals, given the widespread adoption of cloud and mobile technologies that make doing business and sharing information easier than ever. The need for securing data re…

February 29, 2016

SECURITY

RSA Conference Brings Privacy out of the Shadows

As RSA Conference 2016 draws near, I’m excited to see that privacy is at last getting its day in the sun. This topic has often seemed like an after-market add-on at the conference in previous years. Last year, in fact, most of the booths at RSAC were touting the fact that they had security AND priva…

January 25, 2016

SECURITY

Hiding in Plain Sight: Malware’s Use of TLS and Encryption

Introduction TLS (Transport Layer Security) is a cryptographic protocol that provides privacy for applications. TLS is usually implemented on top of common protocols such as HTTP for web browsing or SMTP for email. HTTPS is the usage of TLS over HTTP, which is the most popular way of securing commun…

October 19, 2015

SECURITY

Cisco Next Generation Encryption and Postquantum Cryptography

Cisco developed Next Generation Encryption (NGE) in 2011. NGE was created to define a widely accepted and consistent set of cryptographic algorithms that provide strong security and good performance for our customers. These are the best standards that can be implemented today to meet the security an…

October 28, 2014

SECURITY

File Security With the Click of a Button

Securing our digital lives used to be simpler. Up until a few years ago, we primarily used email as a means for transferring or exchanging files between two parties. A handful of companies emerged to provide email encryption for those who needed it. Most other people did not worry about it. Today, f…