Triage Forensics: Leveraging Digital Forensics during Incident Response
By Brad Garnett You have just been notified by a “TLA” (Three Letter Agency), a law enforcement agency, that your organization has suffered a data breach. Depending on your Threat Management Maturity level, you will either approach this methodically or ad-hoc. A TLA notification will generally involve leveraging the expertise of an Incident Response team, […]
Microsoft Patch Tuesday – May 2017
By Talos Group Today, Microsoft has release their monthly set of security updates designed to address vulnerabilities. This month’s release addresses 56 vulnerabilities with 15 of them rated critical and 41 rated important. Impacted products include .NET, DirectX, Edge, Internet Explorer, Office, Sharepoint, and Windows. In addition to the coverage Talos is providing for the […]
Microsoft Patch Tuesday – May 2017
By Talos Group Today, Microsoft has release their monthly set of security updates designed to address vulnerabilities. This month’s release addresses 56 vulnerabilities with 15 of them rated critical and 41 rated important. Impacted products include .NET, DirectX, Edge, Internet Explorer, Office, Sharepoint, and Windows. In addition to the coverage Talos is providing for the […]
Fortinet Announces Investment in UBIqube to Bolster Cybersecurity Automation across Multi-Vendor Environments
Fortinet Announces Investment in UBIqube to Bolster Cybersecurity Automation across Multi-Vendor Environments Source:: Fortinet
Fortinet Announces Investment in UBIqube to Bolster Cybersecurity Automation across Multi-Vendor Environments
Fortinet Announces Investment in UBIqube to Bolster Cybersecurity Automation across Multi-Vendor Environments Source:: Fortinet
Ransomware & Zero Day Angriffe abwehren!
Ransomware & Zero Day Angriffe abwehren – Verteidigung gegen das Unerkannte Ihr Netzwerk wird ständig von allen Seiten attackiert. Traditionelle Methoden zur Verteidigung Ihres Netzwerks gegen Angreifer und Cyberkriminelle zeigen kaum noch Wirkung. Perimeter werden regelmäßig überwunden, Benutzer klicken weiterhin unreflektiert auf Links und öffnen Anhänge und Ihr Sicherheitspersonal ist angesichts der Flut an Warnmeldungen und […]
Secure the Branch by Securing the Business
By Christian Janoff Security in not simple and not all companies are the same. Different business needs, inter-connected applications, and compliance regulations are coupled with increasing demands of the network by employees, partners, customers and most recently, devices; the fragmentation of the attack surface is maddeningly complex, as thieves become better organized to take advantages […]

