Graphic via Shutterstock Shutterstock.com Privacy & Security Lack of visibility into encrypted traffic still causing trouble Howard Solomon @HowardITWC Published: June 29th, 2016Encrypting corporate data and Internet traffic is recommended as a leading way to help check attackers who manage to gain access to sensitive systems. However, the solution is a double-edged sword.On the one hand an attacker won’t be able to do much with properly encrypted data. On the other hand, infosec pros will have a more difficult time scanning traffic for suspicious activity.David Holmes of F5 Networks points out this dilemma in a column relating to a new encryption cipher released by Google between the Chrome v50 browser and Google services. Some Infosec pros will likely find that their web gateway software doesn’t support the new cipher so can’t see data scanned between clients and Gmail. The choice, Holmes said, is either whitelist gmail –and risk not catching malware — or disable access to Google services like Google search.Who’s at fault? Perhaps Google, which doesn’t always tell security vendors of upcoming Chrome changes. Perhaps the gateway vendor for not keeping up on technology, because the cipher Google added isn’t new. Related Articles Canadian firms not using encryption enough to protect data: SophosFewer than half of Canadian businesses surveyed say they use encryption extensively to protect corporate data, according to a new... January 19th, 2016 Howard Solomon @HowardITWC You’re going the wrong way about data encryption if you’re not doing thisFor the protection of sensitive data, tokenization is every bit as important as data encryption. We are all very familiar... October 10th, 2014 Michael Ball @unix_guru This is getting important, Holmes notes, because an increasing amount of outbound network traffic is encrypted. Is a packet legitimately encrypted by an employee, or by malware? Who knows? It’s only now that security vendors are starting to look at the problem and release solutions. It would help if the info security industry worked closer together. Meanwhile CISOs have to pay more attention to this problem.Read the full column hereWould you recommend this article?00 Thanks for taking the time to let us know what you think of this article! We'd love to hear your opinion about this or any other story you read in our publication. Click this link to send me a note →Jim Love, Chief Content Officer, IT World Canada Related Download Sponsor: CanadianCIO Cybersecurity Conversations with your Board – A Survival Guide A SURVIVAL GUIDE BY CLAUDIO SILVESTRI, VICE-PRESIDENT AND CIO, NAV CANADA Download Now Privacy & Security encryption, security strategies