Articles
How EVE Detects Malicious Uses of Trustworthy Cloud Services
3 min read
Learn how the Encrypted Visibility Engine (EVE) uses ML/AI to identify encrypted malware communication even when it is destined to trustworthy cloud services.
TLS Fingerprinting in the Real World
4 min read
To protect your data, you must understand the traffic on your network.
Detecting Encrypted Malware Traffic (Without Decryption)
7 min read
Identifying threats within encrypted network traffic poses a unique set of challenges, i.e. monitoring traffic for threats and malware, but how to do so while maintaining the privacy of the user.
Hiding in Plain Sight: Malware’s Use of TLS and Encryption
4 min read
Introduction TLS (Transport Layer Security) is a cryptographic protocol that provides privacy for applications. TLS is usually implemented on top of common protocols such as HTTP for web browsing or SMTP for email. HTTPS is the usage of TLS over HTTP, which is the most popular way of securing communication between a web server and […]
1