Netzwerkautomatisierung – worauf achten?

Ivan Pepelnjak´s Vortrag auf der Troopers 17 Security Konferenz In diesem Video erklärt Ivan Pepelnjak (in englischer Sprache) das Vorgehen, wenn man Netzwerkprozesse automatisieren will. Dass daran kein Weg vorbei führt, sollte mittlerweile angesichts der Fülle an Aufgaben jedem Administrator klar sein. Dabei ist es egal, ob man eine kommerzielle Lösung kauft, oder gleich selbst […]

The MeDoc Connection

By Talos Group Summary The Nyetya attack was a destructive ransomware variant that affected many organizations inside of Ukraine and multinational corporations with operations in Ukraine. In cooperation with Cisco Advanced Services Incident Response, Talos identified several key aspects of the attack. The investigation found a supply chain-focused attack at M.E.Doc software that delivered a […]

The MeDoc Connection

By Talos Group Summary The Nyetya attack was a destructive ransomware variant that affected many organizations inside of Ukraine and multinational corporations with operations in Ukraine. In cooperation with Cisco Advanced Services Incident Response, Talos identified several key aspects of the attack. The investigation found a supply chain-focused attack at M.E.Doc software that delivered a […]

GDPR: Start Your Privacy Protection Planning Now

By Edward Thomson One of the most talked about topics at the June Infosecurity Europe 2017 conference in London was the General Data Protection Regulation (GDPR). This is a new law concerning data privacy which will render the implications of a data breach much more severe and comes into force in all EU countries from […]

GDPR: Start Your Privacy Protection Planning Now

By Edward Thomson One of the most talked about topics at the June Infosecurity Europe 2017 conference in London was the General Data Protection Regulation (GDPR). This is a new law concerning data privacy which will render the implications of a data breach much more severe and comes into force in all EU countries from […]

Fallstudie Halle 32 – Mit Sicherheit vernetzt

DIE HALLE 32: ORT MIT TRADITION UND ZUKUNFT – AUCH BEI DER IT-SICHERHEIT – DANK FORTINET UND OBERBERG-ONLINE Die Halle 32 blickt auf mittlerweile über 125 Jahre Tradition zurück. Mitten im Oberbergischen auf dem als Stettenwiesen bekannten Wiesengelände sollte sie von Anfang an ohne Glanz und ohne „Schnick-Schnack“ ihren funktionellen Zweck erfüllen. Damals war das […]

Automating Explicit Trust

By Anthony Grieco We’ve talked about the market transition from implicit to explicit trust. It’s not enough to go on the word of an individual or the reputation of a vendor, customers are demanding explicit trust. Explicit trust is trust that is earned, not assumed. In other words, our customers are demanding evidence to confirm […]