Einträge von Technik Support

Matryoshka Doll Reconnaissance Framework

By Talos Group This post authored by David Maynor & Paul Rascagneres with the contribution of Alex McDonnell and Matthew Molyett Overview Talos has identified a malicious Microsoft Word document with several unusual features and an advanced workflow, performing reconnaissance on the targeted system to avoid sandbox detection and virtual analysis, as well as exploitation […]

Matryoshka Doll Reconnaissance Framework

By Talos Group This post authored by David Maynor & Paul Rascagneres with the contribution of Alex McDonnell and Matthew Molyett Overview Talos has identified a malicious Microsoft Word document with several unusual features and an advanced workflow, performing reconnaissance on the targeted system to avoid sandbox detection and virtual analysis, as well as exploitation […]

How to Improve Privacy as a Component of Your Cyber Governance Program

By Steven Ransom-Jones Many businesses are looking to reap the benefits of digital transformation, evolving new services that provide value to and forge closer relationships with partners and customers. Trust and responsible information management practices are becoming business differentiators as consumers become more aware of the impact of data breaches and the potential for misuse […]

How to Improve Privacy as a Component of Your Cyber Governance Program

By Steven Ransom-Jones Many businesses are looking to reap the benefits of digital transformation, evolving new services that provide value to and forge closer relationships with partners and customers. Trust and responsible information management practices are becoming business differentiators as consumers become more aware of the impact of data breaches and the potential for misuse […]

Keeping Up with Security Vulnerability Disclosures with the Cisco PSIRT openVuln API

By Omar Santos The Cisco PSIRT openVuln API is a RESTful API that allows customers to obtain Cisco security vulnerability information in different machine-consumable formats. It supports industrywide security standards such as the Common Vulnerability Reporting Framework (CVRF), Open Vulnerability and Assessment Language (OVAL), Common Vulnerability and Exposure (CVE) identifiers, Common Weakness Enumeration (CWE), and […]

Keeping Up with Security Vulnerability Disclosures with the Cisco PSIRT openVuln API

By Omar Santos The Cisco PSIRT openVuln API is a RESTful API that allows customers to obtain Cisco security vulnerability information in different machine-consumable formats. It supports industrywide security standards such as the Common Vulnerability Reporting Framework (CVRF), Open Vulnerability and Assessment Language (OVAL), Common Vulnerability and Exposure (CVE) identifiers, Common Weakness Enumeration (CWE), and […]

pxGrid Turns 50 in Just Two Years!

By Andrew Peters Since its introduction in 2015, pxGrid has provided you an open, automated, and effective way for your disparate security technologies to work together. In just two years we’ve added 50 separate products that you can integrate to see and stop threats faster, and demonstrate compliance. And we’re bringing on board a mix […]

pxGrid Turns 50 in Just Two Years!

By Andrew Peters Since its introduction in 2015, pxGrid has provided you an open, automated, and effective way for your disparate security technologies to work together. In just two years we’ve added 50 separate products that you can integrate to see and stop threats faster, and demonstrate compliance. And we’re bringing on board a mix […]

Visibility is the new perimeter; It’s time for Cisco ISE 2.2

By Dan Stotts Visibility doesn’t just mean seeing data move within the network – it also means seeing who and what is on the network. Trends like the Internet of Things (IoT) and Enterprise Mobility – that will result in tens of billions of connected devices and users – are fundamentally changing the enterprise networking […]

Visibility is the new perimeter; It’s time for Cisco ISE 2.2

By Dan Stotts Visibility doesn’t just mean seeing data move within the network – it also means seeing who and what is on the network. Trends like the Internet of Things (IoT) and Enterprise Mobility – that will result in tens of billions of connected devices and users – are fundamentally changing the enterprise networking […]