IoT Isn’t Just About the ‘Thing’

By Anthony Grieco Internet of Things (IoT) is the term du jour. As adoption increases the natural question becomes, how has it been secured? To understand an effective security strategy for IoT, we first need to understand where the value from IoT is generated. The ability to use data, collected from a variety of locations […]

Fortinet Expands the Security Fabric with Enhanced Software-Defined Wide Area Networking Capabilities

Fortinet Expands the Security Fabric with Enhanced Software-Defined Wide Area Networking Capabilities Source:: Fortinet

Fortinet Expands the Security Fabric with Enhanced Software-Defined Wide Area Networking Capabilities

Fortinet Expands the Security Fabric with Enhanced Software-Defined Wide Area Networking Capabilities Source:: Fortinet

Netzwerk und IoT – passt das ?

Ich weiss nicht, ob Sie´s schon wussten, aber Ihr Netzwerk ist kritische Infrastruktur. Zu Hause, wie im Betrieb. Netzwerk und IoT – passt das bei Ihnen schon zusammen? Einer der seit etwa zwei Jahren stark ge-hypten Trends ist das Thema IoT / IoE (Internet of Things / Internet of Everything). Das beschreibt grundsätzlich nichts weiter, als […]

Introducing ROKRAT

By Talos Group This blog was authored by Warren Mercer and Paul Rascagneres with contributions from Matthew Molyett. Executive Summary A few weeks ago, Talos published research on a Korean MalDoc. As we previously discussed this actor is quick to cover their tracks and very quickly cleaned up their compromised hosts. We believe the compromised […]

Introducing ROKRAT

By Talos Group This blog was authored by Warren Mercer and Paul Rascagneres with contributions from Matthew Molyett. Executive Summary A few weeks ago, Talos published research on a Korean MalDoc. As we previously discussed this actor is quick to cover their tracks and very quickly cleaned up their compromised hosts. We believe the compromised […]

Harnessing the Power of NetFlow and Packet Analysis

By Amanda Lemmers Packet capture has long been used by network operators, but a variety of challenges have limited its effectiveness in security and threat detection. In large networks, packet capture can collect terabytes of packet data, and sifting through that data for evidence of an intrusion can take a long time. Traditionally, investigators used […]