Yesterday’s Cyber Posture Just Won’t Work
By Anthony Grieco Cyber threats have changed radically with the evolution of technology. Yet as threats continue to mount, many enterprises are still relying on yesterday’s cyber protection methods, technology infrastructure, and cultural ethos as the foundations for their modernization efforts. While IT digitization is integral to business growth and trajectory, enterprises must also update […]
Fortinet to Announce First Quarter 2017 Financial Results
Fortinet to Announce First Quarter 2017 Financial Results Source:: Fortinet
Fortinet to Announce First Quarter 2017 Financial Results
Fortinet to Announce First Quarter 2017 Financial Results Source:: Fortinet
Der 7-Tage-Check für Ihre Sicherheit
Lassen Sie Ihr Netzwerk von Oberberg-Online Technikern analysieren – schnell & unkompliziert Im Rahmen des Cyber Threat Assessment Program (kurz: CTAP) können Sie Ihr Netzwerk innerhalb von nur 7 Tagen auf Bedrohungen, Nutzerverhalten und Bandbreitennutzung analysieren lassen. Die Analyse Ihres Netzwerks läuft beim CTAP über eine FortiGate, unsere Next Generation Firewall. Die FortiGate wird dabei […]
Black Hat Asia 2017: SOC in the NOC
By Jessica Bair Detecting PowerShell Exploits Black Hat returned to Asia again in 2017, with two days of technical hands-on Trainings, followed by two days of the latest research and vulnerability disclosures at the Briefings. The backbone of the conference was the WiFi network, built on site by staff from Ruckus. I was honored to […]
Black Hat Asia 2017: SOC in the NOC
By Jessica Bair Detecting PowerShell Exploits Black Hat returned to Asia again in 2017, with two days of technical hands-on Trainings, followed by two days of the latest research and vulnerability disclosures at the Briefings. The backbone of the conference was the WiFi network, built on site by staff from Ruckus. I was honored to […]
IoT Isn’t Just About the ‘Thing’
By Anthony Grieco Internet of Things (IoT) is the term du jour. As adoption increases the natural question becomes, how has it been secured? To understand an effective security strategy for IoT, we first need to understand where the value from IoT is generated. The ability to use data, collected from a variety of locations […]

