Under the hood: Why you need AMP on ESA

By Evgeny Mirolyubov With 95 percent of breaches starting with a malicious email campaign, it’s more important than ever for organizations to be prepared and to be certain that their email security solution will truly protect their data, assets and users. In a recent blog post we discussed the need for advanced threat protection at […]

Under the hood: Why you need AMP on ESA

By Evgeny Mirolyubov With 95 percent of breaches starting with a malicious email campaign, it’s more important than ever for organizations to be prepared and to be certain that their email security solution will truly protect their data, assets and users. In a recent blog post we discussed the need for advanced threat protection at […]

Innovaphone veröffentlicht neue Software V12r2

Innovaphone veröffentlicht neue Software V12r2 Zum 01.06.2017 geht die neue Innovaphone PBX in Version 12r2 an den Start. Nach Abschluss der intensiven beta-Phase ist es nun soweit und es gibt grünes Licht für die finale Fassung und deren Einsatz im Live-Betrieb. Die interessantesten Features stellen wir heute vor: innovaphone Apps PBX eigene Apps werden direkt […]

The Significance of Log Sources to Building Effective Intelligence-Driven Incident Response

By Aaron Varrone Many organizations today fail in adequately acquiring the necessary visibility across their network to perform efficient and effective Incident Response tasks, one of which is Intelligence-Driven Incident Response; defined as driving intelligence mechanisms to dig deeper into detecting, containing, and eradicating the latest cyber threats. Occasionally, adversaries may leave evidence on compromised […]

The Significance of Log Sources to Building Effective Intelligence-Driven Incident Response

By Aaron Varrone Many organizations today fail in adequately acquiring the necessary visibility across their network to perform efficient and effective Incident Response tasks, one of which is Intelligence-Driven Incident Response; defined as driving intelligence mechanisms to dig deeper into detecting, containing, and eradicating the latest cyber threats. Occasionally, adversaries may leave evidence on compromised […]

BWT Podcast EP5 – It Has Been 0-days Since This Term was Abused

By Mitch Neff Beers with Talos Episode 5 “It Has Been 0-days Since This Term was Abused” is now available. Beers with Talos offers a topical, fast-paced, and slightly irreverent take on cybersecurity issues. If you are an executive, a grizzled SOC vet, or a n00b, you will take something away from each episode. We […]

BWT Podcast EP5 – It Has Been 0-days Since This Term was Abused

By Mitch Neff Beers with Talos Episode 5 “It Has Been 0-days Since This Term was Abused” is now available. Beers with Talos offers a topical, fast-paced, and slightly irreverent take on cybersecurity issues. If you are an executive, a grizzled SOC vet, or a n00b, you will take something away from each episode. We […]