If you've been working in or around the IT security field for any amount of time, you are probably quite familiar with the term "Man-in-the-Middle" (MitM) as it relates to a method of attack.

What I'm even more interested in these days is an emerging typology, the new Man-in-the-Middle – or what I like to describe as being the "MitM Redux" – and in this context we are not referring to an attack method, but instead applying the term to describe a role that is becoming all the more common.

Security practitioners and infosec students who have crammed for the CISSP and GISP certification exams understand MitM to be a type of crypto attack that is usually explained by using the now ubiquitous characters Alice, Bob and Mallory.

Complete your profile to continue reading and get FREE access to CUTimes.com, part of your ALM digital membership.

  • Critical CUTimes.com information including comprehensive product and service provider listings via the Marketplace Directory, CU Careers, resources from industry leaders, webcasts, and breaking news, analysis and more with our informative Newsletters.
  • Exclusive discounts on ALM and CU Times events.
  • Access to other award-winning ALM websites including Law.com and GlobeSt.com.
NOT FOR REPRINT

© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.