A Comparison of SOC Models for Today’s Need of Monitoring & Detecting the Latest Cyber Threats
By Aaron Varrone At Cisco, we are often asked to take a vendor agnostic approach when developing a Security Operations Center (SOC) strategy, and as such, we must consider the importance of distinguishing between the various types of SOC models in today’s demanding security needs. However, before explaining the various models that exist for today’s […]
A Comparison of SOC Models for Today’s Need of Monitoring & Detecting the Latest Cyber Threats
By Aaron Varrone At Cisco, we are often asked to take a vendor agnostic approach when developing a Security Operations Center (SOC) strategy, and as such, we must consider the importance of distinguishing between the various types of SOC models in today’s demanding security needs. However, before explaining the various models that exist for today’s […]
RSA Conference 2017 Security Operations Center Wrap-Up
By Jessica Bair Effective Security requires three essential pillars: Simple to use, Open architecture and Automated workflows. The collaboration with RSA NetWitness Packets and Cisco AMP Threat Grid, in the RSA Conference 2017 Security Operations Center, exemplified the power of a four year partnership that provides an effective solution for network forensics and malware analysis. […]
RSA Conference 2017 Security Operations Center Wrap-Up
By Jessica Bair Effective Security requires three essential pillars: Simple to use, Open architecture and Automated workflows. The collaboration with RSA NetWitness Packets and Cisco AMP Threat Grid, in the RSA Conference 2017 Security Operations Center, exemplified the power of a four year partnership that provides an effective solution for network forensics and malware analysis. […]
Cisco Coverage for ‘Magic Hound’
By Talos Group ‘Magic Hound‘ is the code name used to reference a seemingly limited series of malware distribution campaigns that were observed targeting organizations in Saudi Arabia as well as organizations with business interests in Saudi Arabia. Similar to other malware distribution campaigns that Talos has observed and documented, this series of campaigns made […]
Cisco Coverage for ‘Magic Hound’
By Talos Group ‘Magic Hound‘ is the code name used to reference a seemingly limited series of malware distribution campaigns that were observed targeting organizations in Saudi Arabia as well as organizations with business interests in Saudi Arabia. Similar to other malware distribution campaigns that Talos has observed and documented, this series of campaigns made […]
Ende des Supports für folgende Innovaphone-Modelle
Ende des Supports für folgende Innovaphone-Modelle Wichtig für alle Innovaphone Kunden: Ab der neuen PBX Version 12r2 werden folgende Geräte nicht mehr unterstützt, da diese nicht über genügend Speicher verfügen: IP-Telefone: – IP110 – IP200A – IP230 – IP240 Nicht betroffen davon sind die IP-Telefone IP110A und IP240A. Diese werden auch in Version 12r2 unterstützt. Gateways: […]

