Tech insight

We provide up-to-date technical security information about MONITORAPP solutions.
Let’s share useful technical knowledge that helps you do your job easily.

Security tactics for safe online conferences

Due to the prolonged pandemic, work-from-home and video conferences are projected to increase in its usage. Looking at vulnerabilities discovered so far, attacks on video chats are predicted to increase in the future. Find out how you can stay safe when using online conferencing platforms.

What is Threat Intelligence?

1. Concepts, types, and life-cycle
Threat Intelligence or CTI (Cyber Threat Intelligence) is an emerging topic when it comes to security threats and responses. This article discusses not only the basic backgrounds and needs but goes in-depth about types of threat intelligence, and the threat intelligence lifecycle as well.

All about SSL/TLS

1. Let us know SSL/TLS, Cryptographic Communication
If the website uses SSL/TLS to communicate between the browser and the server, it will start with https:// in the web browser address bar. It seems like a long time ago that major portal sites such as G-mail and Naver switched to Hyper Text Transfer Protocol Secure (HTTPS) using the secure encryption protocol SSL/TLS. Encryption traffic is expected to exceed 80% for all industries this year. SSL/TLS, beyond the mainstream, is already real. Let me tell you what SSL is, why certificate is important in SSL, how SSL/TLS is encrypted communication, and so on.
2. The Need for SSL Visibility Solutions and Smart Choices
Security incidents continue to occur, even though we’ve introduced various security equipment to prevent attacks and Why? SSL is designed to encrypt packets sent over the network to prevent de-escalation, which in turn is a dilemma: encryption protects malicious code and illegal data-destruction attempts. SSL is being exploited as a new attack route for security attackers. With the generalization of SSL traffic such as HTTPS, SMTPS, POP3S, FTPS, etc., encryption traffic is rapidly increasing while existing network security equipment is not able to detect SSL traffic or significantly degraded when performing darkening. That’s why hackers attack you even if you’re armed with a variety of security devices. I’m going to tell you what the trap is for encrypted communications (SSL), why you need an SSL visibility solution, and how to choose a smart SSL visibility solution.
Scroll Up