{"id":27234,"date":"2014-11-08T08:41:12","date_gmt":"2014-11-08T13:41:12","guid":{"rendered":"http:\/\/www.opensource.im\/?p=27234"},"modified":"2014-11-08T08:41:12","modified_gmt":"2014-11-08T13:41:12","slug":"spread-of-internet-encryption-creating-visibility-void-claims-blue-coat","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/spread-of-internet-encryption-creating-visibility-void-claims-blue-coat.php","title":{"rendered":"Spread of Internet encryption creating &#8216;visibility void&#8217; claims Blue Coat"},"content":{"rendered":"<p><p>    Large numbers of websites and Internet services are    disappearing behind encrypted connections, part of a growing    visibility void in which organisations struggle to tell    friendly traffic from foe, security firm Blue Coat has argued.  <\/p>\n<p>    At first sight its an odd perspective because the use of    encrypted HTTPS connections by services such as Google,    Facebook and Twitter is normally seen as a good thing, which    indeed it is. But tolerance of unmonitored traffic is now    carving out a space for malevolent traffic to flourish, or so    the argument goes.  <\/p>\n<p>    The problem is that organisations can ignore encrypted traffic    and risk letting in malevolent software which also increasingly    uses encryption to hide command and control, or disallow it    all, making it impossible for employees to visit legitimate    sites.  <\/p>\n<p>    Using figures from Blue Coats customers, 69 percent of traffic    to the top 50 most popular websites is now encrypted by    default, with Google, Facebook, YouTube, Yahoo and Baidu the    top five in that order.  <\/p>\n<p>    Only mass-market news sites such as ESPN, BBC News, CNN, or    Pandora, leave encryption turned off for maximum compatibility.    In the UK, the BBC is now the only non-encrypted site in the    top ten.  <\/p>\n<p>    Meanwhile, the growth of cloud services - big users of    encryption - is adding to the probability that in time almost    all corporate traffic would be invisible.  <\/p>\n<p>    The tug of war between personal privacy and corporate security    is leaving the door open for novel malware attacks involving    SSL over corporate networks that put everyones data at risk,    claimed Blue Coats chief security strategist, Hugh Thompson.  <\/p>\n<p>    For corporations to secure customer data and meet regulatory    and compliance requirements, they need the visibility to see    the threats hiding in encrypted traffic and the granular    control to make sure employee privacy is also maintained.  <\/p>\n<p>    The firm also said that around one in ten of the security    requests its researchers received in an average week was now    regarding a suspicious website using encryption, equivalent to    around 100,000 requests.  <\/p>\n<p>    It is these dark or unknown sites that underline the need to    monitor encrypted channels, he firm said, giving the example of    the Dyre malware as only the latest example from a growing list    using encrypted channels.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read the original:<br \/>\n<a target=\"_blank\" href=\"http:\/\/news.techworld.com\/security\/3584936\/spread-of-internet-encryption-creating-visibility-void-claims-blue-coat\/?olo=rss\/RK=0\/RS=k6tWoBCAn1btUbPx21L8BtVvwAs-\" title=\"Spread of Internet encryption creating 'visibility void' claims Blue Coat\">Spread of Internet encryption creating 'visibility void' claims Blue Coat<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Large numbers of websites and Internet services are disappearing behind encrypted connections, part of a growing visibility void in which organisations struggle to tell friendly traffic from foe, security firm Blue Coat has argued. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-27234","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/27234"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=27234"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/27234\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=27234"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=27234"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=27234"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}