Do You Know How Secure Your Software Vendors Are?
By Edna Conway Third parties remain a critical source of security risk. The recent discovery of malware embedded within the consumer application CCleaner, discovered by Cisco’s Talos cybersecurity research team, reminds us that cyber hygiene lies not just within ourselves. Talos stated in its September 18th Update: “Supply chain attacks are a very effective way […]
Uncover the Where, When, and How of an Attack with “Trajectory” from Cisco AMP for Endpoints
By John Dominguez You’re walking down the sidewalk, headphones in your ears, music blasting, and your head is buried in your phone reading a text message. CRUNCH. You look down and you’ve just stepped in a pile of… (no, not that)… broken glass. A car parked on the street was broken-into, and the glass from […]
Uncover the Where, When, and How of an Attack with “Trajectory” from Cisco AMP for Endpoints
By John Dominguez You’re walking down the sidewalk, headphones in your ears, music blasting, and your head is buried in your phone reading a text message. CRUNCH. You look down and you’ve just stepped in a pile of… (no, not that)… broken glass. A car parked on the street was broken-into, and the glass from […]
KMU-Backup in der Regio-Cloud Oberberg
FUJITSU CELVIN NAS sind die idealen Netzwerk-Datenspeicher für KMU. Kombiniert mit den Vorteilen eines dezentralen Backups in der Regio-Cloud Oberberg senken Sie das Risiko vor Datenverlust deutlich – und schlafen bedeutend ruhiger. Stellen Sie sich einfach einmal vor, in Ihrem IT-Raum kommt es zu einem Brand, oder zu einer Überhitzung, die Ihre Daten unlesbar machen. […]
Do you trust the endpoints connecting to your network?
By Thomas Licisyn Trust gets a bad rap in the security industry, but in reality, it’s a necessary part of any relationship. Without trust, today’s organizations couldn’t function, and productivity would come to a screeching halt. The thing is – how do you know that the devices coming onto your network are trustworthy? We already […]
Do you trust the endpoints connecting to your network?
By Thomas Licisyn Trust gets a bad rap in the security industry, but in reality, it’s a necessary part of any relationship. Without trust, today’s organizations couldn’t function, and productivity would come to a screeching halt. The thing is – how do you know that the devices coming onto your network are trustworthy? We already […]
Incident Response Fundamentals – Communication
By Sean Mason While there are a number of ways to err during the course of responding to an incident, it never seems to fail that the number one misstep I have continued to see comes down to internal communications among those working on the incident and communications to stakeholders. To that point, it’s astonishing […]

