Search
00
GBAF Logo
trophy
Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

Subscribe to our newsletter

Get the latest news and updates from our team.

Global Banking & Finance Review®

Global Banking & Finance Review® - Subscribe to our newsletter

Company

    GBAF Logo
    • About Us
    • Advertising and Sponsorship
    • Profile & Readership
    • Contact Us
    • Latest News
    • Privacy & Cookies Policies
    • Terms of Use
    • Advertising Terms
    • Issue 81
    • Issue 80
    • Issue 79
    • Issue 78
    • Issue 77
    • Issue 76
    • Issue 75
    • Issue 74
    • Issue 73
    • Issue 72
    • Issue 71
    • Issue 70
    • View All
    • About the Awards
    • Awards Timetable
    • Awards Winners
    • Submit Nominations
    • Testimonials
    • Media Room
    • FAQ
    • Asset Management Awards
    • Brand of the Year Awards
    • Business Awards
    • Cash Management Banking Awards
    • Banking Technology Awards
    • CEO Awards
    • Customer Service Awards
    • CSR Awards
    • Deal of the Year Awards
    • Corporate Governance Awards
    • Corporate Banking Awards
    • Digital Transformation Awards
    • Fintech Awards
    • Education & Training Awards
    • ESG & Sustainability Awards
    • ESG Awards
    • Forex Banking Awards
    • Innovation Awards
    • Insurance & Takaful Awards
    • Investment Banking Awards
    • Banking Awards
    • Banking Innovation Awards
    • Digital Banking Awards
    • Finance Awards
    • Investor Relations Awards
    • Leadership Awards
    • Islamic Banking Awards
    • Real Estate Awards
    • Project Finance Awards
    • Process & Product Awards
    • Telecommunication Awards
    • HR & Recruitment Awards
    • Trade Finance Awards
    • The Next 100 Global Awards
    • Wealth Management Awards
    • Travel Awards
    • Years of Excellence Awards
    • Publishing Principles
    • Ownership & Funding
    • Corrections Policy
    • Editorial Code of Ethics
    • Diversity & Inclusion Policy
    • Fact Checking Policy
    • Financial Awards
    • Private Banking Awards
    • Private Banking Innovation Awards
    • Retail Banking Awards
    Original content: Global Banking and Finance Review - https://www.globalbankingandfinance.com

    A global financial intelligence and recognition platform delivering authoritative insights, data-driven analysis, and institutional benchmarking across Banking, Capital Markets, Investment, Technology, and Financial Infrastructure.

    Copyright © 2010-2026 - All Rights Reserved. | Sitemap | Tags

    Editorial & Advertiser disclosure

    Global Banking & Finance Review® is an online platform offering news, analysis, and opinion on the latest trends, developments, and innovations in the banking and finance industry worldwide. The platform covers a diverse range of topics, including banking, insurance, investment, wealth management, fintech, and regulatory issues. The website publishes news, press releases, opinion and advertorials on various financial organizations, products and services which are commissioned from various Companies, Organizations, PR agencies, Bloggers etc. These commissioned articles are commercial in nature. This is not to be considered as financial advice and should be considered only for information purposes. It does not reflect the views or opinion of our website and is not to be considered an endorsement or a recommendation. We cannot guarantee the accuracy or applicability of any information provided with respect to your individual or personal circumstances. Please seek Professional advice from a qualified professional before making any financial decisions. We link to various third-party websites, affiliate sales networks, and to our advertising partners websites. When you view or click on certain links available on our articles, our partners may compensate us for displaying the content to you or make a purchase or fill a form. This will not incur any additional charges to you. To make things simpler for you to identity or distinguish advertised or sponsored articles or links, you may consider all articles or links hosted on our site as a commercial article placement. We will not be responsible for any loss you may suffer as a result of any omission or inaccuracy on the website.

    1. Home
    2. >Technology
    3. >PONEMON: FINANCIAL INSTITUTIONS NOT PREPARED TO ADDRESS CYBERATTACKS IN ENCRYPTED TRAFFIC
    Technology

    Ponemon: Financial Institutions Not Prepared to Address Cyberattacks in Encrypted Traffic

    Published by Gbaf News

    Posted on September 16, 2016

    9 min read

    Last updated: January 22, 2026

    Add as preferred source on Google
    This image captures the tension surrounding South Korean President Yoon Suk Yeol as he refuses questioning related to insurrection charges, coinciding with violent clashes involving his supporters at a court building. The escalating situation highlights the ongoing political turmoil in South Korea.
    South Korean President Yoon Suk Yeol defies questioning amid court rampage - Global Banking & Finance Review
    Why waste money on news and opinion when you can access them for free?

    Take advantage of our newsletter subscription and stay informed on the go!

    Subscribe

    Global Banking & Finance Awards 2026 — Now Open for Entries
    Global Banking & Finance Awards 2026 — Call for Entries

    By Duncan Hughes, Systems Engineering Director EMEA, A10 Networks

    Verizon’s 2016 Data Breach Investigations Report found that 89 percent of breaches last year were motivated by greed or espionage. Since motives are increasingly financial, it makes sense that the financial institutions that underpin the world’s economy are increasingly targeted. The Ponemon Institute found, on average, 83 percent of financial companies suffer more than 50 attacks per month. As a result, banks, credit unions, brokerage firms and exchanges — large and small — are shoring up their defenses to prepare for the inevitability of a cyberattack. One of the defensive measures they use is encryption, which protects the privacy and integrity of sensitive information by rendering it unreadable if stolen or intercepted.

    PONEMON: FINANCIAL INSTITUTIONS NOT PREPARED TO ADDRESS CYBERATTACKS IN ENCRYPTED TRAFFIC

    The dark side of SSL encryption
    Unfortunately, encryption also has a dark side; increasingly, cyber attackers are using encryption to hide their exploits. A10 recently sponsored a survey by the Ponemon Institute, “Hidden Threats in Encrypted Traffic: Industry Verticals,” to dig into the risks posed by encrypted traffic. The results demonstrated that financial institutions may be woefully unprepared to protect against the attacks using encrypted traffic to hide their activity. As a baseline, respondents estimate 32 percent of their institution’s outbound traffic is encrypted today; they expect that percentage to go up to 46 percent over the next 12 months. As that percentage increases, it’s logical the percentage of threats in encrypted traffic will also go up. In fact, 58 percent of respondents think attackers will increase their use of encryption (to evade detection and bypass controls) over the next 12 months. When asked whether their institution recognises that malicious users leverage SSL encryption to conceal their exploits, only 41 percent agreed (23 percent were unsure and 36 percent disagreed). While this percentage may seem to imply there is a disconnect between the risk and an institution’s recognition of that risk, it is probably more indicative of an institution’s direct experience. Notably, 40 percent of the respondents confirmed that attacks on their institution had used encryption to evade detection. (81 percent acknowledged they had been a victim of a cyberattack or malicious insider activity in the past 12 months.)

    Gauging the importance of SSL inspection
    So, perhaps institutions are waiting to see these attacks firsthand before they implement measures to prevent them? Despite 90 percent of the financial services respondents recognizing that the inspection of SSL traffic is “Important” to “Essential” to their overall security infrastructure, only 42 percent are actually decrypting Web traffic to detect attacks, intrusions and malware. This can be a very dangerous game of chicken for financial institutions to play. Respondents indicated they knew their institutions were at risk:

    • 70 percent were concerned or very concerned that encrypted traffic would leave their network vulnerable to hidden threats
    • 71 percent felt that compromised insider credentials, due to malware hiding inside encrypted SSL traffic, could cause a data breach (18 percent were unsure)
    • 61 percent agreed that the inability of their current security infrastructure to inspect encrypted traffic compromises their ability to meet existing and future compliance requirements.
    • 33 percent felt their institution would be able to prevent costly data breaches and loss of intellectual property by detecting SSL traffic that is malicious

    Why aren’t they decrypting encrypted traffic to look for attacks it may hide? Respondents cited a lack of enabling security tools (53 percent), insufficient resources (43 percent) and performance degradation (42 percent) as the main reasons they don’t decrypt and inspect their Web traffic. Unsurprisingly, 50 percent noted their institution’s security solutions are collapsing under growing SSL bandwidth demands and SSL key lengths.

    Your SSL decryption strategy
    All told, 57 percent of the financial services respondents, which don’t currently decrypt, have plans to decrypt and inspect traffic to uncover potential attacks. Before they can, however, they need to find solutions that truly meet their needs. They indicated the following features were “Important” to “Essential” in an SSL inspection tool:

    • Securely manage SSL certificates and keys – 90 percent
    • Scale to meet current and future SSL performance demands – 87 percent
    • Maximise the uptime and performance requirements of the overall capacity of the security infrastructure – 84 percent
    • Satisfy compliance requirements – 81 percent
    • Granularly parse and control traffic based on custom-defined policies – 78 percent
    • Categorize web traffic to ensure confidential or sensitive data remains encrypted (satisfy regulatory requirements) – 77 percent
    • Intelligently route traffic to multiple security devices  – 77 percent
    • Interoperate with a diverse set of security products from multiple vendors – 75 percent

    Decrypt, inspect SSL traffic with Thunder SSLi

    These are capabilities that the A10 Thunder® SSLi® can provide. SSLi offloads SSL decryption and re-encryption from third-party security devices to enhance the performance of the overall infrastructure and ensure malware and insider threats hidden in SSL are detected. With SSLi, financial services firms can eliminate blind spots created by SSL to protect their sensitive data, meet compliance (e.g., PCI, GLBA, SOX) requirements and improve their network’s overall performance — all with a lower total cost of ownership (TCO). For more information on the Ponemon survey, please check out this white paper; for more details on our SSLi offering, you can download our solution brochure.

    By Duncan Hughes, Systems Engineering Director EMEA, A10 Networks

    Verizon’s 2016 Data Breach Investigations Report found that 89 percent of breaches last year were motivated by greed or espionage. Since motives are increasingly financial, it makes sense that the financial institutions that underpin the world’s economy are increasingly targeted. The Ponemon Institute found, on average, 83 percent of financial companies suffer more than 50 attacks per month. As a result, banks, credit unions, brokerage firms and exchanges — large and small — are shoring up their defenses to prepare for the inevitability of a cyberattack. One of the defensive measures they use is encryption, which protects the privacy and integrity of sensitive information by rendering it unreadable if stolen or intercepted.

    PONEMON: FINANCIAL INSTITUTIONS NOT PREPARED TO ADDRESS CYBERATTACKS IN ENCRYPTED TRAFFIC

    The dark side of SSL encryption
    Unfortunately, encryption also has a dark side; increasingly, cyber attackers are using encryption to hide their exploits. A10 recently sponsored a survey by the Ponemon Institute, “Hidden Threats in Encrypted Traffic: Industry Verticals,” to dig into the risks posed by encrypted traffic. The results demonstrated that financial institutions may be woefully unprepared to protect against the attacks using encrypted traffic to hide their activity. As a baseline, respondents estimate 32 percent of their institution’s outbound traffic is encrypted today; they expect that percentage to go up to 46 percent over the next 12 months. As that percentage increases, it’s logical the percentage of threats in encrypted traffic will also go up. In fact, 58 percent of respondents think attackers will increase their use of encryption (to evade detection and bypass controls) over the next 12 months. When asked whether their institution recognises that malicious users leverage SSL encryption to conceal their exploits, only 41 percent agreed (23 percent were unsure and 36 percent disagreed). While this percentage may seem to imply there is a disconnect between the risk and an institution’s recognition of that risk, it is probably more indicative of an institution’s direct experience. Notably, 40 percent of the respondents confirmed that attacks on their institution had used encryption to evade detection. (81 percent acknowledged they had been a victim of a cyberattack or malicious insider activity in the past 12 months.)

    Gauging the importance of SSL inspection
    So, perhaps institutions are waiting to see these attacks firsthand before they implement measures to prevent them? Despite 90 percent of the financial services respondents recognizing that the inspection of SSL traffic is “Important” to “Essential” to their overall security infrastructure, only 42 percent are actually decrypting Web traffic to detect attacks, intrusions and malware. This can be a very dangerous game of chicken for financial institutions to play. Respondents indicated they knew their institutions were at risk:

    • 70 percent were concerned or very concerned that encrypted traffic would leave their network vulnerable to hidden threats
    • 71 percent felt that compromised insider credentials, due to malware hiding inside encrypted SSL traffic, could cause a data breach (18 percent were unsure)
    • 61 percent agreed that the inability of their current security infrastructure to inspect encrypted traffic compromises their ability to meet existing and future compliance requirements.
    • 33 percent felt their institution would be able to prevent costly data breaches and loss of intellectual property by detecting SSL traffic that is malicious

    Why aren’t they decrypting encrypted traffic to look for attacks it may hide? Respondents cited a lack of enabling security tools (53 percent), insufficient resources (43 percent) and performance degradation (42 percent) as the main reasons they don’t decrypt and inspect their Web traffic. Unsurprisingly, 50 percent noted their institution’s security solutions are collapsing under growing SSL bandwidth demands and SSL key lengths.

    Your SSL decryption strategy
    All told, 57 percent of the financial services respondents, which don’t currently decrypt, have plans to decrypt and inspect traffic to uncover potential attacks. Before they can, however, they need to find solutions that truly meet their needs. They indicated the following features were “Important” to “Essential” in an SSL inspection tool:

    • Securely manage SSL certificates and keys – 90 percent
    • Scale to meet current and future SSL performance demands – 87 percent
    • Maximise the uptime and performance requirements of the overall capacity of the security infrastructure – 84 percent
    • Satisfy compliance requirements – 81 percent
    • Granularly parse and control traffic based on custom-defined policies – 78 percent
    • Categorize web traffic to ensure confidential or sensitive data remains encrypted (satisfy regulatory requirements) – 77 percent
    • Intelligently route traffic to multiple security devices  – 77 percent
    • Interoperate with a diverse set of security products from multiple vendors – 75 percent

    Decrypt, inspect SSL traffic with Thunder SSLi

    These are capabilities that the A10 Thunder® SSLi® can provide. SSLi offloads SSL decryption and re-encryption from third-party security devices to enhance the performance of the overall infrastructure and ensure malware and insider threats hidden in SSL are detected. With SSLi, financial services firms can eliminate blind spots created by SSL to protect their sensitive data, meet compliance (e.g., PCI, GLBA, SOX) requirements and improve their network’s overall performance — all with a lower total cost of ownership (TCO). For more information on the Ponemon survey, please check out this white paper; for more details on our SSLi offering, you can download our solution brochure.

    More from Technology

    Explore more articles in the Technology category

    Image for The Data Intelligence Gap: Why Precision Is Becoming Critical in Enterprise Sales
    The Data Intelligence Gap: Why Precision Is Becoming Critical in Enterprise Sales
    Image for How Data Observability Is Evolving in Financial Services
    How Data Observability Is Evolving in Financial Services
    Image for When Is a Dedicated Server the Right Choice for Your Business?
    When Is a Dedicated Server the Right Choice for Your Business?
    Image for Enter Now for Best IT/Technology Recruitment Agency 2026
    Enter Now for Best IT/Technology Recruitment Agency 2026
    Image for The Rise of Intelligent Automation: How Technology Is Redefining Work and Efficiency
    The Rise of Intelligent Automation: How Technology Is Redefining Work and Efficiency
    Image for How Automation Technologies Are Transforming Everyday Business Operations
    How Automation Technologies Are Transforming Everyday Business Operations
    Image for Asprofin Bank Announces Financing Initiative for Modular ‘Nanocenter’ Data Infrastructure
    Asprofin Bank Announces Financing Initiative for Modular ‘Nanocenter’ Data Infrastructure
    Image for Basel IV vs. The AI Bots: Why the Banking Rulebook Must Evolve in the Age of Algorithmic Herding
    Basel Iv Vs. The AI Bots: Why the Banking Rulebook Must Evolve in the Age of Algorithmic Herding
    Image for NordQuant Deploys Distributed Systems to Enhance Enterprise Digital Capabilities Introduction
    NordQuant Deploys Distributed Systems to Enhance Enterprise Digital Capabilities Introduction
    Image for Calling Entries for Data Center Deal of the Year 2026
    Calling Entries for Data Center Deal of the Year 2026
    Image for Nominations Now Open for Best Website Design Company 2026
    Nominations Now Open for Best Website Design Company 2026
    Image for Call for Entries: Best Digital Innovation Company (Non-Financial / Cross-Industry) 2026
    Call for Entries: Best Digital Innovation Company (Non-Financial / Cross-Industry) 2026
    View All Technology Posts
    Previous Technology PostWhy AR and Iot Are Set to Change Our World as We Know IT
    Next Technology PostIndustry Turning to Technology and External Helpto Deal With Regulatory Deadlines, Reveals Kneip Survey