The Power of Role Models and a Good Book

By Lisa Bobbitt My path to cybersecurity looks more like a winding road than a straight line, but it’s the influential role models and valuable information I consumed with every turn that paved my path towards a career in cybersecurity – specifically privacy. I fell into secure networking by chance. I was attending North Carolina State University and […]

Source:: Cisco Security Notice

The Power of Role Models and a Good Book

By Lisa Bobbitt My path to cybersecurity looks more like a winding road than a straight line, but it’s the influential role models and valuable information I consumed with every turn that paved my path towards a career in cybersecurity – specifically privacy. I fell into secure networking by chance. I was attending North Carolina State University and […]

Source:: Cisco Security Notice

Fortinet to Present at UBS Global Technology Conference

Fortinet to Present at UBS Global Technology Conference

Source:: Fortinet

Fortinet to Present at UBS Global Technology Conference

Fortinet to Present at UBS Global Technology Conference

Source:: Fortinet

Achtung! Neue Ransomware in Deutschland im Umlauf

Unser Partner G DATA warnt vor einer aktuellen Ransomware, die offenbar auf deutsche Nutzer abzielt. „Ordinypt“, auch als „HSDFSDCrypt“ im Umlauf, ist in fehlerfreiem Deutsch verfasst und kommt – wie häufig – mit einem als PDF getarnten Dateinanhang.

Laut G DATA scheint die Malware wieder einmal an Personalabteilungen gerichtet zu sein.

„Ordinypt“ ist in der selten verwendeten Programmiersprache Delphi verfasst. Auffällig ist weiterhin, dass für jede Erpressung andere Zieladressen für die Zahlung generiert werden – offenbar, um die Spurensuche nochmals komplizierter zu gestalten.

Kunden, die G DATA einsetzen, sind laut Hersteller bereits jetzt geschützt.

Den vollständigen Artikel im Blog unseres Partners G DATA finden Sie hier.

For threat correlation across endpoint, network, and cloud – connect the dots

By Beth Barach When I was a kid, I used to love dot-to-dot books. I enjoyed formulating a guess of what the picture was, the hunt in finding all the dots, the satisfaction of connecting them all together, and the excitement of the final picture coming into view to either confirm, or deny, my suspicions of what I […]

Source:: Cisco Security Notice

For threat correlation across endpoint, network, and cloud – connect the dots

By Beth Barach When I was a kid, I used to love dot-to-dot books. I enjoyed formulating a guess of what the picture was, the hunt in finding all the dots, the satisfaction of connecting them all together, and the excitement of the final picture coming into view to either confirm, or deny, my suspicions of what I […]

Source:: Cisco Security Notice

Fortinet Recommended in NSS Labs Next-Generation Intrusion Prevention System (NGIPS) Test

Fortinet Recommended in NSS Labs Next-Generation Intrusion Prevention System (NGIPS) Test

Source:: Fortinet