Fortinet schützt die Hacker-Spielwiese bei der Black Hat Konferenz
Seit 1997 gibt es die Black Hat Security-Konferenzen und in dieser Zeit haben sich die Veranstaltungen zum wohl renommiertesten Hacker- und Sicherheits-Event in der Welt entwickelt. Für die diesjährige Konferenz, die vom 30.07. bis zum 04.08.2016 in Las Vegas stattfindet, wurde vom Veranstalter unser Technologie-Partner Fortinet ausgewählt, um gemeinsam mit den Black Hat Technikern ein […]
Protect the Branch with Stealthwatch Learning Network License
By Brian Ford The threat environment faced by organization deploying branch networks continues to evolve. It’s time for a disruptive approach to handling network security across many distributed branch sites. Automation is becoming a requirement, because the growing volume and complexity of the threats to data security have made it impossible to keep up with […]
Protect the Branch with Stealthwatch Learning Network License
By Brian Ford The threat environment faced by organization deploying branch networks continues to evolve. It’s time for a disruptive approach to handling network security across many distributed branch sites. Automation is becoming a requirement, because the growing volume and complexity of the threats to data security have made it impossible to keep up with […]
Ransomware: Because OpSec Is Hard?
By Talos Group This blog was authored by Edmund Brumaghin and Warren Mercer Summary Talos recently published research regarding a new variant of destructive ransomware, which we dubbed Ranscam. During further analysis of Ranscam samples, we discovered several indicators of compromise (IOCs) that piqued our curiosity as to which malware this threat actor might be […]
Ransomware: Because OpSec Is Hard?
By Talos Group This blog was authored by Edmund Brumaghin and Warren Mercer Summary Talos recently published research regarding a new variant of destructive ransomware, which we dubbed Ranscam. During further analysis of Ranscam samples, we discovered several indicators of compromise (IOCs) that piqued our curiosity as to which malware this threat actor might be […]
Cognitive Bias in Incident Response
By Gavin Reid This blog is a co-authored by Jeff Bollinger & Gavin Reid Are You Too Confident in Your Incident Response? When Charles Darwin stated “Ignorance more frequently begets confidence than does knowledge,” civilization’s evolution from Industrial Age to Information Age was nearly a century away. Yet, when it comes to many aspects of […]
Cognitive Bias in Incident Response
By Gavin Reid This blog is a co-authored by Jeff Bollinger & Gavin Reid Are You Too Confident in Your Incident Response? When Charles Darwin stated “Ignorance more frequently begets confidence than does knowledge,” civilization’s evolution from Industrial Age to Information Age was nearly a century away. Yet, when it comes to many aspects of […]

