Debunking the myths of DNS security
By Kevin Rollinson For years, we’ve been pioneering the use of DNS to enforce security. We recognized that DNS was often a blind spot for organizations and that using DNS to enforce security… Source:: Cisco Security Notice
Fortinet Honors 2017 Partner of the Year Award Winners
Fortinet Honors 2017 Partner of the Year Award Winners Source:: Fortinet
Fortinet Honors 2017 Partner of the Year Award Winners
Fortinet Honors 2017 Partner of the Year Award Winners Source:: Fortinet
CannibalRAT targets Brazil
By Talos Group Malware continues to evolve in different ways and forms, one of which is the language it is written in, from Visual C++, to Powershell, almost everything has been used to… Source:: Cisco Security Notice
CannibalRAT targets Brazil
By Talos Group Malware continues to evolve in different ways and forms, one of which is the language it is written in, from Visual C++, to Powershell, almost everything has been used to… Source:: Cisco Security Notice
The Power of Logging in Incident Response
By Brad Garnett A deep dive into logging as an often-overlooked but powerful tool for incident detection and response “Lack of instrumentation or insufficient logging” is often a phrase used on incident response… Source:: Cisco Security Notice
The Power of Logging in Incident Response
By Brad Garnett A deep dive into logging as an often-overlooked but powerful tool for incident detection and response “Lack of instrumentation or insufficient logging” is often a phrase used on incident response… Source:: Cisco Security Notice

