The KISS Principle for Successful Expansion into the Cloud: Keep It Simple and Secure

By Brian Roddy As the calendar turns to 2019 in a matter of weeks we will be bombarded with a series of new predictions and resolutions. We had the same barrage last year,

Source:: Cisco Security Notice

Security Operations Track: the session for security professionals at Cisco Live

By Cristina Errico 87% of companies across Europe, Middle East and Africa admitted they suffered a cyber attack in the past year. Read for a detailed agenda of the Security Operations Track session.

Source:: Cisco Security Notice

Making Data Work for Businesses and Citizens with Data Curation and Sound Data Privacy Practices

By Michelle Dennedy The trend will continue, and it’s important for everyone to understand that the lens through which we view data privacy has a major impact on business.

Source:: Cisco Security Notice

Bereits 72% des Netzwerkverkehrs laufen verschlüsselt

Bereits 72% des Netzwerkverkehrs laufen verschlüsselt

Bereits im Oktober 2016 haben wir zum Thema Verschlüsselung des Datenverkehrs und damit verbundene Risiken einen Artikel veröffentlicht. Das Thema ist brennender denn je, weil mittlerweile fast drei Viertel des gesamten Datenverkehrs verschlüsselt wird.

Was gut gedacht ist, nämlich den Datenstrom zwischen zwei Punkten zu schützen, wird zunehmend von Kriminellen genutzt. Ältere Firewalls und Intension Prävention Systeme (IPS) können i.d.R. entweder keine Kontrolle dieser Daten durchführen, oder verzögern diesen Check-Mechanismus einfach derart, dass auf eine Prüfung des Öfteren verzichtet wird. So können dann auch verschlüsselte Schadcodes ungehindert ins Unternehmensnetzwerk eindringen und sich verbreiten.

Sprechen Sie mit uns über moderne Sicherheitslösungen, mit denen Sie die Kontrolle zurückgewinnen.

DSC_2022 klein

Bastian Breidenbach

breidenbach@oberberg.net

DSC_2012 klein

Dennis Goslar

goslar@oberberg.net

Dirk Zurawski
02261 9155051
zurawski@oberberg.net

Improve network and security operations with Firepower multi-instance and Cisco Threat Response

By Joel Ferman With our latest release, Firepower Threat Defense (FTD) 6.3, our team is delivering value and bringing new possibilities to Firepower customers of all sizes.

Source:: Cisco Security Notice

An introduction to offensive capabilities of Active Directory on UNIX

By Talos Group Tim Wadhwa-Brown of Portcullis Labs authored this post. In preparation for our talk at Black Hat Europe, Security Advisory EMEAR would like to share the background on our recent research into some common

Source:: Cisco Security Notice

Defeating Polymorphic Malware with Cognitive Intelligence. Part 3: Static Analysis

By Evgeny Mirolyubov Nowadays, everyone likes to talk about the use of machine learning in cybersecurity. Almost every security vendor leverages machine learning in one form or another. Organizations employ security teams with

Source:: Cisco Security Notice

Compromise Assessment vs Threat Hunting

By Brad Garnett While table top exercises are always a hot commodity for our customers, proactive threat hunting and compromise assessments are becoming increasingly popular through our Cisco

Source:: Cisco Security Notice

Cisco Threat Response with Email Security Integration: Harmonizing Your Security Products

By TK Keanini Those of us who have been in security for more than 20 years are very familiar with the assertion that security is a process. For me, security has always been

Source:: Cisco Security Notice