Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Internet Architecture Board Calls For Net Encryption By Default
Newest First  |  Oldest First  |  Threaded View
Marilyn Cohodas
Marilyn Cohodas,
User Rank: Strategist
11/24/2014 | 10:32:46 AM
Re: Encryption: A benefit as well as detriment
This does seem like a radical change that will pose some serious implementation  issues for many security teams. But the Gartner prediction -- if true -- that, by 2017, more than half of all cyberattacks will use some form of encryption to sneak malicious traffic by security systems -- is pretty scary.
GonzSTL
GonzSTL,
User Rank: Ninja
11/21/2014 | 2:35:24 PM
Re: Encryption: A benefit as well as detriment
Nothing is scarier than knowing that you do not know what data is flowing through your network. Implementation of this within an internal private network should only come after security related products have been developed that take this into account. This would probably also mean that existing products will be forklifted to make room for the new ones - a very expensive undertaking.
Kelly Jackson Higgins
Kelly Jackson Higgins,
User Rank: Strategist
11/21/2014 | 2:06:52 PM
Re: Encryption is our friend, not so fast
Yes, @DrT. That's what this story talks about as the tradeoff. 
Marilyn Cohodas
Marilyn Cohodas,
User Rank: Strategist
11/21/2014 | 8:11:34 AM
No win situationtre
This does seem like a damned if you do and damned if you don't situation. But given the trends outlined in the article, to do nothing seems to be the worst-case scenario..
RyanSepe
RyanSepe,
User Rank: Ninja
11/20/2014 | 10:35:10 AM
Re: Encryption: A benefit as well as detriment
Agreed. Maybe I should have phrased "as well as a detriment" in a hesitant questionesque manner. But visiblity may be difficult because encryption methodologies seek specifically to limit the scope of unathorized visibility. As posed before, would the pervasive detection tools now be able to see through the encryption? Because as stated in the article if they cant, changes/modifications can be made without knowledge of the enterprise security initiative.
Dr.T
Dr.T,
User Rank: Ninja
11/20/2014 | 10:29:38 AM
Re: Encryption: A benefit as well as detriment
Encryption can be fast enough and minimal impact on the network and systems, the main problem is the visibility. 
Dr.T
Dr.T,
User Rank: Ninja
11/20/2014 | 10:28:21 AM
Re: x.509 Galore
Public-private pair is the way to go. You have to have something you do not share with anyone but yourself. If more than two people know it, does not matter how many certificate we have.
Dr.T
Dr.T,
User Rank: Ninja
11/20/2014 | 10:25:40 AM
Encryption is our friend, not so fast
I would love to see encryption across the board in and out of the networks. There is one single problem: visibility. You know you encrypted everything and you do not know what is flowing in your network that would not mean you are secure. The tools that are required to monitor the network should also be encryption-aware for this to succeed.
RyanSepe
RyanSepe,
User Rank: Ninja
11/20/2014 | 8:54:49 AM
Encryption: A benefit as well as detriment
Thats terrifying that the increase of encryption throughout the stack will cause a growing blindspot within organizations. Are the pervasive scans currently being leveraged through IDS/IPS and MSSP's not able to break through the encryption to depict events efficiently today? Or is the obfuscation referenced here due to strictly human correlated data audits?
macker490
macker490,
User Rank: Ninja
11/20/2014 | 8:14:47 AM
x.509 Galore
Once just about everyone has an x.509 certificate ( we are close now ) -- just about everything you look at will appear to be valid.

this is a problem on the net NOW as people really don't know, from day to day what a site is suppose to look like -- nor x.509 identifications.

until people take up the practice of validatating and signing x.509 certificates the problem will remain: we don't know who to trust.

the deluge of x.509 certificates that your browser dumps on you should all be flagged MARGINAL TRUST

to get Full Trust you need to check the fingerprint on the certificate with a reliable source and then sign the certificate using your copy of PGP/Desktop or GnuPG

reliable source: I recommend your local Credit Union.   A co-operative would need to be set up.


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Practical Network Security Approaches for a Multicloud, Hybrid IT World
The report covers areas enterprises should focus on for their multicloud/hybrid cloud security strategy: -increase visibility over the environment -learning cloud-specific skills -relying on established security frameworks -re-architecting the network
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-30333
PUBLISHED: 2022-05-09
RARLAB UnRAR before 6.12 on Linux and UNIX allows directory traversal to write to files during an extract (aka unpack) operation, as demonstrated by creating a ~/.ssh/authorized_keys file. NOTE: WinRAR and Android RAR are unaffected.
CVE-2022-23066
PUBLISHED: 2022-05-09
In Solana rBPF versions 0.2.26 and 0.2.27 are affected by Incorrect Calculation which is caused by improper implementation of sdiv instruction. This can lead to the wrong execution path, resulting in huge loss in specific cases. For example, the result of a sdiv instruction may decide whether to tra...
CVE-2022-28463
PUBLISHED: 2022-05-08
ImageMagick 7.1.0-27 is vulnerable to Buffer Overflow.
CVE-2022-28470
PUBLISHED: 2022-05-08
marcador package in PyPI 0.1 through 0.13 included a code-execution backdoor.
CVE-2022-1620
PUBLISHED: 2022-05-08
NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 in GitHub repository vim/vim prior to 8.2.4901. NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 allows attackers to cause a denial of service (application crash) via a crafted input.