Cisco Firepower 2100 Series Delivers Business Resiliency and Effective Security with a New Architectural Approach
By David C. Stuart We live in a time when lines in IT are blurring, and the line between security and network operations is just one example. When organizations are breached, their network is imperiled and business can suffer. Resiliency, performance, and threat defense are increasingly intertwined. No one understands this better than Cisco, with […]
Cisco Firepower 2100 Series Delivers Business Resiliency and Effective Security with a New Architectural Approach
By David C. Stuart We live in a time when lines in IT are blurring, and the line between security and network operations is just one example. When organizations are breached, their network is imperiled and business can suffer. Resiliency, performance, and threat defense are increasingly intertwined. No one understands this better than Cisco, with […]
Vulnerability Spoltlight: Multiple Vulnerabilities in the Aerospike NoSQL Database Server
By Talos Group Vulnerabilities discovered by Talos Talos is releasing multiple vulnerabilities discovered in the Aerospike Database Server. These vulnerabilities range from Denial of Service to potential remote code execution. This software is used by various companies that require a high performance NoSQL database. These issues have been addressed in version 3.11.1.1 of the Aerospike […]
Vulnerability Spoltlight: Multiple Vulnerabilities in the Aerospike NoSQL Database Server
By Talos Group Vulnerabilities discovered by Talos Talos is releasing multiple vulnerabilities discovered in the Aerospike Database Server. These vulnerabilities range from Denial of Service to potential remote code execution. This software is used by various companies that require a high performance NoSQL database. These issues have been addressed in version 3.11.1.1 of the Aerospike […]
Neue Version des Netzwerk-Tools Wireshark
Neue Version des Netzwerk-Tools Wireshark Das vermutlich weltweit meist genutzte Netzwerk-Analyse-Werkzeug steht in der neuen stable-Version 2.2.4 zum Download bereit. Geneigte User können auf der Wireshark-Seite die gewünschte Version für Windows oder Mac OS herunterladen. Die Release-Notes zu den Versionen sind hier zu finden…und den User Guide gibt´s hier. Wer nicht lesen mag, kann sich die […]
A Comparison of SOC Models for Today’s Need of Monitoring & Detecting the Latest Cyber Threats
By Aaron Varrone At Cisco, we are often asked to take a vendor agnostic approach when developing a Security Operations Center (SOC) strategy, and as such, we must consider the importance of distinguishing between the various types of SOC models in today’s demanding security needs. However, before explaining the various models that exist for today’s […]
A Comparison of SOC Models for Today’s Need of Monitoring & Detecting the Latest Cyber Threats
By Aaron Varrone At Cisco, we are often asked to take a vendor agnostic approach when developing a Security Operations Center (SOC) strategy, and as such, we must consider the importance of distinguishing between the various types of SOC models in today’s demanding security needs. However, before explaining the various models that exist for today’s […]

