An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily take advantage of the asymmetric workload. Attackers request a connection and then renegotiate the SSL connection repeatedly to max out the server’s CPU. The result: No legitimate users can connect. However you can easily mitigate these attacks. Watch this video to learn how you can continue to process valid user requests and keep attackers in the dark.