Neue Version des Netzwerk-Tools Wireshark

Neue Version des Netzwerk-Tools Wireshark Das vermutlich weltweit meist genutzte Netzwerk-Analyse-Werkzeug steht in der neuen stable-Version 2.2.4 zum Download bereit. Geneigte User können auf der Wireshark-Seite die gewünschte Version für Windows oder Mac OS herunterladen. Die Release-Notes zu den Versionen sind hier zu finden…und den User Guide gibt´s hier. Wer nicht lesen mag, kann sich die […]

A Comparison of SOC Models for Today’s Need of Monitoring & Detecting the Latest Cyber Threats

By Aaron Varrone At Cisco, we are often asked to take a vendor agnostic approach when developing a Security Operations Center (SOC) strategy, and as such, we must consider the importance of distinguishing between the various types of SOC models in today’s demanding security needs. However, before explaining the various models that exist for today’s […]

A Comparison of SOC Models for Today’s Need of Monitoring & Detecting the Latest Cyber Threats

By Aaron Varrone At Cisco, we are often asked to take a vendor agnostic approach when developing a Security Operations Center (SOC) strategy, and as such, we must consider the importance of distinguishing between the various types of SOC models in today’s demanding security needs. However, before explaining the various models that exist for today’s […]

RSA Conference 2017 Security Operations Center Wrap-Up

By Jessica Bair Effective Security requires three essential pillars: Simple to use, Open architecture and Automated workflows. The collaboration with RSA NetWitness Packets and Cisco AMP Threat Grid, in the RSA Conference 2017 Security Operations Center, exemplified the power of a four year partnership that provides an effective solution for network forensics and malware analysis. […]

RSA Conference 2017 Security Operations Center Wrap-Up

By Jessica Bair Effective Security requires three essential pillars: Simple to use, Open architecture and Automated workflows. The collaboration with RSA NetWitness Packets and Cisco AMP Threat Grid, in the RSA Conference 2017 Security Operations Center, exemplified the power of a four year partnership that provides an effective solution for network forensics and malware analysis. […]

Cisco Coverage for ‘Magic Hound’

By Talos Group ‘Magic Hound‘ is the code name used to reference a seemingly limited series of malware distribution campaigns that were observed targeting organizations in Saudi Arabia as well as organizations with business interests in Saudi Arabia. Similar to other malware distribution campaigns that Talos has observed and documented, this series of campaigns made […]

Cisco Coverage for ‘Magic Hound’

By Talos Group ‘Magic Hound‘ is the code name used to reference a seemingly limited series of malware distribution campaigns that were observed targeting organizations in Saudi Arabia as well as organizations with business interests in Saudi Arabia. Similar to other malware distribution campaigns that Talos has observed and documented, this series of campaigns made […]