Threat Roundup for May 18-25

By Talos Group Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between May 18 and May 25. As with previous round-ups, this post isn’t meant to be an

Source:: Cisco Security Notice

Why phishing attacks still win and what you can do about it, Part I

By Munawar Hossain In the last few years we have seen a fundamental shift in cybercriminal tactics leveraging social engineering techniques. Among the most effective of these techniques are phishing attacks, where cybercriminals

Source:: Cisco Security Notice

Why phishing attacks still win and what you can do about it, Part I

By Munawar Hossain In the last few years we have seen a fundamental shift in cybercriminal tactics leveraging social engineering techniques. Among the most effective of these techniques are phishing attacks, where cybercriminals

Source:: Cisco Security Notice

VPNFilter

By Talos Group Intro For several months, Talos has been working with public- and private-sector threat intelligence partners and law enforcement in researching an advanced, likey state-sponsored or state-affiliated actor’s widespread use

Source:: Cisco Security Notice

VPNFilter

By Talos Group Intro For several months, Talos has been working with public- and private-sector threat intelligence partners and law enforcement in researching an advanced, likey state-sponsored or state-affiliated actor’s widespread use

Source:: Cisco Security Notice

Hello, GDPR Enforcement

By Michelle Dennedy It’s here. The much anticipated, oft-discussed, enforcement date of May 25 for the EU General Data Protection Regulation (GDPR) has arrived.

Source:: Cisco Security Notice

Hello, GDPR Enforcement

By Michelle Dennedy It’s here. The much anticipated, oft-discussed, enforcement date of May 25 for the EU General Data Protection Regulation (GDPR) has arrived.

Source:: Cisco Security Notice

Sicherheitsthemen ohne Fach-Chinesisch?

Heute gibt es die erste Aufzeichnung der diesjährigen Sicherheitskonferenz Troopers. Wir waren wieder gerne vor Ort und haben alle Augen und Ohren offen gehalten, um aktuelle Themen und Trends im Sicherheitsumfeld aus den Bereichen Unternehmen, Forschung, Lehre und Hacking für Euch mitzubringen.

Dr. Kelley Misata und Diana Kelley haben einen spannenden Vortrag zum Thema Sprachgebrauch im Security-Umfeld gehalten. Eigentlich ist das ein „Wachrüttler“ auch für uns, denn viel zu oft verlieren wir uns ja im Alltagsgeschäft in einer technischen Ausdrucksweise, die für Euch nicht immer leicht zugänglich ist.

Hier unser Angebot: Lasst uns Eure Fragen zukommen und wir beantworten diese in „Normalsprache“, ohne Fach-Chinesisch.

 

 

 

The Importance of an Information Security Strategy in Mergers and Acquisitions

By Nick Kelly Organizations that engage in M&A should include an information security strategy as part of the process.

Source:: Cisco Security Notice

The Importance of an Information Security Strategy in Mergers and Acquisitions

By Nick Kelly Organizations that engage in M&A should include an information security strategy as part of the process.

Source:: Cisco Security Notice