FIPS and Deterministic ECDSA: Achieving robust security and conformance

By Panos Kampanakis Digital signatures are used to verify the authenticity of a message. For example, when a message is signed, the verifier can rest assured that only the signer could have signed it. ECDSA and DSA are two widely used, standardized digital signature schemes. In order to sign a message, internally both of them […]

innovaphone Widgets – Call me Button

innovaphone Widgets – Call me Button Kontaktformulare sind nur zweite Wahl. Unmittelbar und mit Ton und Bild zu kommunizieren, ist das i-Tüpfelchen für die Kundenansprache auf Ihrer Webseite. Mit dem „Call Me Button“ von innovaphone wird Ihrem Kunden die Möglichkeit gegeben, mit nur einem Mausklick die Frage gleich vom Fachpersonal persönlich beantwortet zu bekommen. Die […]

Cisco Signs on with Privacy Shield

By Michelle Dennedy As I blogged in July of this year, Cisco supports protecting and enabling the international flow of personal data that furthers a progressive economy. To that end, we received official word that we are loud, proud, and on the list for the Privacy Shield – the voluntary, self-certification framework for EU-US data […]

Cisco Signs on with Privacy Shield

By Michelle Dennedy As I blogged in July of this year, Cisco supports protecting and enabling the international flow of personal data that furthers a progressive economy. To that end, we received official word that we are loud, proud, and on the list for the Privacy Shield – the voluntary, self-certification framework for EU-US data […]

Customer-focused Incident Response Service

By Matt Aubert In our highly connected business environments, the need to respond to the inevitable security breach is on the minds of every CISO. An increasing number of organizations rely on the services of a Managed Detection and Response (MDR) provider. According to the Cisco 2016 Annual Security Report, 42 percent of surveyed companies […]

Customer-focused Incident Response Service

By Matt Aubert In our highly connected business environments, the need to respond to the inevitable security breach is on the minds of every CISO. An increasing number of organizations rely on the services of a Managed Detection and Response (MDR) provider. According to the Cisco 2016 Annual Security Report, 42 percent of surveyed companies […]

Project FIRST: Share Knowledge, Speed up Analysis

By Talos Group Project FIRST is lead by Angel M. Villegas. This post is authored by Holger Unterbrink. Talos is pleased to announce the release of the Function Identification and Recovery Signature Tool (FIRST). It is an open-source framework that allows sharing of knowledge about similar functions used across file types that IDA Pro can […]