Cybersecurity is Everyone’s Responsibility: 5 ways to turbo charge your security practices

By Scott Garrett This post was authored by Scott Garrett, GSSO, Cisco and Matt Gyde, Group Executive Security, Dimension Data. The speed at which we operate in a mobile world can result in risky user behaviors that threat actors are taking advantage of in order to breach information. Attackers are targeting the human element of […]

Cybersecurity is Everyone’s Responsibility: 5 ways to turbo charge your security practices

By Scott Garrett This post was authored by Scott Garrett, GSSO, Cisco and Matt Gyde, Group Executive Security, Dimension Data. The speed at which we operate in a mobile world can result in risky user behaviors that threat actors are taking advantage of in order to breach information. Attackers are targeting the human element of […]

Taking the Necessary Cybersecurity Steps Forward with Federal Government Programs

By Larry Payne As government agencies begin deploying cloud solutions and strategizing to meet cloud IT modernization mandates, a question arises – what will the future of the agency look like when they update their systems and start implementing cloud solutions? And further, possibly most important – will cybersecurity protocols hold up? There are many […]

Taking the Necessary Cybersecurity Steps Forward with Federal Government Programs

By Larry Payne As government agencies begin deploying cloud solutions and strategizing to meet cloud IT modernization mandates, a question arises – what will the future of the agency look like when they update their systems and start implementing cloud solutions? And further, possibly most important – will cybersecurity protocols hold up? There are many […]

Disassembler and Runtime Analysis

By Talos Group This post was authored by Paul Rascagneres. Introduction In the CCleaner 64bit stage 2 previously described in our blog, we explained that the attacker modified a legitimate executable that is part of “Symantec Endpoint”. This file is named EFACli64.dll. The modification is performed in the runtime code included by the compiler, more […]

Disassembler and Runtime Analysis

By Talos Group This post was authored by Paul Rascagneres. Introduction In the CCleaner 64bit stage 2 previously described in our blog, we explained that the attacker modified a legitimate executable that is part of “Symantec Endpoint”. This file is named EFACli64.dll. The modification is performed in the runtime code included by the compiler, more […]

FUJITSU Aktionsmodelle Oktober 2017

Im Herbst planen viele IT-Verantwortliche zum Einen die Verwendung der letzten Budgetpositionen, zum Anderen beginnt auch die Etatplanung für das kommende Jahr. Anregungen zur Verwendung bieten wir gerne. Sei es mit den Aktionsmodellen unseres Partners FUJITSU für den Oktober (hier klicken für Server und Storage, hier klicken für Desktop-Systeme und hier klicken für Mobiles) , oder […]