SearchSecurity.com

Does the Bit9 compromise call application whitelisting into question?

I've read that the Bit9 compromise involved the company's own encryption keys, which led to trouble for customers of Bit9's whitelisting services. Would you say this was likely a one-off incident, or should enterprises reconsider using application whitelisting technology? Is there any way to sniff out certificates that have been signed by malicious hackers?

    Requires Free Membership to View

All Rights Reserved, Copyright 2000 - 2013 , TechTarget | Read our Privacy Statement