Stop SSL-Encrypted Attacks in their Tracks! - Webinar
Join us to learn how Thales Luna HSMs integrate with F5 Networks BIG IP Load Balancer to protect the integrity of SSL communications.
Topics:
- SSL begins with an exchange of public keys that will in turn be used to encrypt a symmetric key that can only be decrypted by the other party's private key.
- SSL "handshakes" are used to pass the symmetric encryption key that is used to encrypt the data and communications between the two parties.
- Circumventing traditional oversight and control mechanisms, SSL can be used to hide and disguise potential threats.
- Learn about the details of SSL vulnerabilties and find out how to address related threats with hardware security modules.