Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Internet Architecture Board Calls For Net Encryption By Default
Newest First  |  Oldest First  |  Threaded View
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
11/24/2014 | 10:32:46 AM
Re: Encryption: A benefit as well as detriment
This does seem like a radical change that will pose some serious implementation  issues for many security teams. But the Gartner prediction -- if true -- that, by 2017, more than half of all cyberattacks will use some form of encryption to sneak malicious traffic by security systems -- is pretty scary.
GonzSTL
50%
50%
GonzSTL,
User Rank: Ninja
11/21/2014 | 2:35:24 PM
Re: Encryption: A benefit as well as detriment
Nothing is scarier than knowing that you do not know what data is flowing through your network. Implementation of this within an internal private network should only come after security related products have been developed that take this into account. This would probably also mean that existing products will be forklifted to make room for the new ones - a very expensive undertaking.
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
11/21/2014 | 2:06:52 PM
Re: Encryption is our friend, not so fast
Yes, @DrT. That's what this story talks about as the tradeoff. 
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
11/21/2014 | 8:11:34 AM
No win situationtre
This does seem like a damned if you do and damned if you don't situation. But given the trends outlined in the article, to do nothing seems to be the worst-case scenario..
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
11/20/2014 | 10:35:10 AM
Re: Encryption: A benefit as well as detriment
Agreed. Maybe I should have phrased "as well as a detriment" in a hesitant questionesque manner. But visiblity may be difficult because encryption methodologies seek specifically to limit the scope of unathorized visibility. As posed before, would the pervasive detection tools now be able to see through the encryption? Because as stated in the article if they cant, changes/modifications can be made without knowledge of the enterprise security initiative.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
11/20/2014 | 10:29:38 AM
Re: Encryption: A benefit as well as detriment
Encryption can be fast enough and minimal impact on the network and systems, the main problem is the visibility. 
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
11/20/2014 | 10:28:21 AM
Re: x.509 Galore
Public-private pair is the way to go. You have to have something you do not share with anyone but yourself. If more than two people know it, does not matter how many certificate we have.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
11/20/2014 | 10:25:40 AM
Encryption is our friend, not so fast
I would love to see encryption across the board in and out of the networks. There is one single problem: visibility. You know you encrypted everything and you do not know what is flowing in your network that would not mean you are secure. The tools that are required to monitor the network should also be encryption-aware for this to succeed.
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
11/20/2014 | 8:54:49 AM
Encryption: A benefit as well as detriment
Thats terrifying that the increase of encryption throughout the stack will cause a growing blindspot within organizations. Are the pervasive scans currently being leveraged through IDS/IPS and MSSP's not able to break through the encryption to depict events efficiently today? Or is the obfuscation referenced here due to strictly human correlated data audits?
macker490
50%
50%
macker490,
User Rank: Ninja
11/20/2014 | 8:14:47 AM
x.509 Galore
Once just about everyone has an x.509 certificate ( we are close now ) -- just about everything you look at will appear to be valid.

this is a problem on the net NOW as people really don't know, from day to day what a site is suppose to look like -- nor x.509 identifications.

until people take up the practice of validatating and signing x.509 certificates the problem will remain: we don't know who to trust.

the deluge of x.509 certificates that your browser dumps on you should all be flagged MARGINAL TRUST

to get Full Trust you need to check the fingerprint on the certificate with a reliable source and then sign the certificate using your copy of PGP/Desktop or GnuPG

reliable source: I recommend your local Credit Union.   A co-operative would need to be set up.


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Data Breaches Affect the Enterprise
Data breaches continue to cause negative outcomes for companies worldwide. However, many organizations report that major impacts have declined significantly compared with a year ago, suggesting that many have gotten better at containing breach fallout. Download Dark Reading's Report "How Data Breaches Affect the Enterprise" to delve more into this timely topic.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-44093
PUBLISHED: 2021-11-28
A Remote Command Execution vulnerability on the background in zrlog 2.2.2, at the upload avatar function, could bypass the original limit, upload the JSP file to get a WebShell
CVE-2021-44094
PUBLISHED: 2021-11-28
ZrLog 2.2.2 has a remote command execution vulnerability at plugin download function, it could execute any JAR file
CVE-2021-4020
PUBLISHED: 2021-11-27
janus-gateway is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-23654
PUBLISHED: 2021-11-26
This affects all versions of package html-to-csv. When there is a formula embedded in a HTML page, it gets accepted without any validation and the same would be pushed while converting it into a CSV file. Through this a malicious actor can embed or generate a malicious link or execute commands via C...
CVE-2021-43785
PUBLISHED: 2021-11-26
@joeattardi/emoji-button is a Vanilla JavaScript emoji picker component. In affected versions there are two vectors for XSS attacks: a URL for a custom emoji, and an i18n string. In both of these cases, a value can be crafted such that it can insert a `script` tag into the page and execute malicious...