Go back

08 November 2021 Kurt Haller

More than 90% of Q2 malware was hidden in encrypted traffic

MORE THAN 90% OF Q2 MALWARE WAS HIDDEN IN ENCRYPTED TRAFFIC

As stated in Dark Reading, "A study of threat activity conducted by WatchGuard Technologies using anonymized data gathered from customer networks showed 91.5% of malware detections in the second quarter of 2021 involved malware arriving over HTTPS-encrypted connections. Only 20% of organizations currently have mechanisms for decrypting and scanning HTTPS traffic for malware, meaning the remaining 80% are at risk of missing nine-tenths of the malware hitting their networks daily."

It is evident from the statistics above, encrypted attacks are now a reality. What's even scarier is that organisations don't have the right solutions in place to effectively detect these new attacks. Venari Security's technology and experienced team can help your organisation mitigate risk by effectively detecting encrypted threats using the latest version of TLS encryption.

#BeTheHunterNotTheHunted #VenariSecurity #ETA #encryptedtrafficanalysis #encryptedtraffic #networksecurity #NTA #networktrafficanalysis #NTA #cybersecurity #enterprisesecurity #encryption #AI #malware #ransomware #TLS1.3 #TLS

Get the Measure

  • 23 May 2022 Hiten Mistry

    Encrypted data is good for you

    Almost all data is encrypted from end to end. That’s a good thing. Venari Security is here to make today’s encrypted world more secure and compliant. Some...

  • 20 May 2022 Simon Mullis

    Long-term operational resilience includes security planning

    With today’s greater connectivity between companies, there’s an increasing disconnect between what we need to know, and what we do know. Scenario planning...

  • 18 May 2022 Chanj Grewal

    Venari Security Townhall

    It was great to see the full Venari Security team yesterday at our monthly Town Hall meeting. These sessions are a priceless way of bringing everyone...

View more

Reassurance Can Replace Uncertainty

Once established, any deviation can be quickly identified, and the appropriate action taken for the containment of incidents.

Positive, long-term security can replace a reactive, unstable environment.

See how