Tour the RSA Conference SOC
By Jessica Bair Next week, some 30,000 security professionals will descend upon the Moscone Center in San Francisco for the 2017 RSA Conference. Cisco’s AMP Threat Grid, the first unified Malware Analysis and Threat Intelligence solution, partnered with RSA to create the RSA Conference Security Operations Center (SOC), where engineers will monitor all traffic on […]
Tour the RSA Conference SOC
By Jessica Bair Next week, some 30,000 security professionals will descend upon the Moscone Center in San Francisco for the 2017 RSA Conference. Cisco’s AMP Threat Grid, the first unified Malware Analysis and Threat Intelligence solution, partnered with RSA to create the RSA Conference Security Operations Center (SOC), where engineers will monitor all traffic on […]
When a Pony Walks Out Of A Pub
By Talos Group This blog was authored by Warren Mercer and Paul Rascagneres. Talos has observed a small email campaign leveraging the use of Microsoft Publisher files. These .pub files are normally used for the publishing of documents such as newsletters, allowing users to create such documents using familiar office functions such as mail merging. […]
When a Pony Walks Out Of A Pub
By Talos Group This blog was authored by Warren Mercer and Paul Rascagneres. Talos has observed a small email campaign leveraging the use of Microsoft Publisher files. These .pub files are normally used for the publishing of documents such as newsletters, allowing users to create such documents using familiar office functions such as mail merging. […]
Cisco 2017 Annual Cybersecurity Report: The Hidden Danger of Uninvestigated Threats
By David Ulevitch Responding to security threats requires time, talent and money — resources that most security professionals would agree are in seemingly short supply. As discussed in the Cisco 2017 Annual Cybersecurity Report (ACR), security teams seek out strategies such as automated security solutions or cloud-based tools to overcome these resource constraints. Effective security […]
Cisco 2017 Annual Cybersecurity Report: The Hidden Danger of Uninvestigated Threats
By David Ulevitch Responding to security threats requires time, talent and money — resources that most security professionals would agree are in seemingly short supply. As discussed in the Cisco 2017 Annual Cybersecurity Report (ACR), security teams seek out strategies such as automated security solutions or cloud-based tools to overcome these resource constraints. Effective security […]
Fortinet Reports Fourth Quarter and Full Year 2016 Financial Results
Fortinet Reports Fourth Quarter and Full Year 2016 Financial Results Source:: Fortinet

