Debunking the myths of DNS security

By Kevin Rollinson For years, we’ve been pioneering the use of DNS to enforce security. We recognized that DNS was often a blind spot for organizations and that using DNS to enforce security… Source:: Cisco Security Notice

Fortinet Honors 2017 Partner of the Year Award Winners

Fortinet Honors 2017 Partner of the Year Award Winners Source:: Fortinet

Fortinet Honors 2017 Partner of the Year Award Winners

Fortinet Honors 2017 Partner of the Year Award Winners Source:: Fortinet

CannibalRAT targets Brazil

By Talos Group Malware continues to evolve in different ways and forms, one of which is the language it is written in, from Visual C++, to Powershell, almost everything has been used to… Source:: Cisco Security Notice

CannibalRAT targets Brazil

By Talos Group Malware continues to evolve in different ways and forms, one of which is the language it is written in, from Visual C++, to Powershell, almost everything has been used to… Source:: Cisco Security Notice

The Power of Logging in Incident Response

By Brad Garnett A deep dive into logging as an often-overlooked but powerful tool for incident detection and response “Lack of instrumentation or insufficient logging” is often a phrase used on incident response… Source:: Cisco Security Notice

The Power of Logging in Incident Response

By Brad Garnett A deep dive into logging as an often-overlooked but powerful tool for incident detection and response “Lack of instrumentation or insufficient logging” is often a phrase used on incident response… Source:: Cisco Security Notice