Hiding in Plain Sight: Malware’s Use of TLS and Encryption
By Blake Anderson Introduction TLS (Transport Layer Security) is a cryptographic protocol that provides privacy for applications. TLS is usually implemented on top of common protocols such as HTTP for web browsing or SMTP for email. HTTPS is the usage of TLS over HTTP, which is the most popular way of securing communication between a […]
Overcoming the DNS “Blind Spot”
By John Stuppi [ed. note – this post was authored jointly by John Stuppi and Dan Hubbard ] The Domain Name Service (DNS) provides the IP addresses of intended domain names in response to queries from requesting end hosts. Because many threat actors today are leveraging DNS to compromise end hosts monitoring DNS is often […]
Overcoming the DNS “Blind Spot”
By John Stuppi [ed. note – this post was authored jointly by John Stuppi and Dan Hubbard ] The Domain Name Service (DNS) provides the IP addresses of intended domain names in response to queries from requesting end hosts. Because many threat actors today are leveraging DNS to compromise end hosts monitoring DNS is often […]
Why Aging Infrastructure Is a Growing Problem
By Anthony Grieco Defending a network against threats of growing complexity requires a mix of technology and policies that are as sophisticated as the campaigns created by attackers. A necessary component to an efffective defense includes tackling the low-hanging fruit—that is, basic tasks such as patching vulnerabilities and updating old software. However, as we relate […]
Why Aging Infrastructure Is a Growing Problem
By Anthony Grieco Defending a network against threats of growing complexity requires a mix of technology and policies that are as sophisticated as the campaigns created by attackers. A necessary component to an efffective defense includes tackling the low-hanging fruit—that is, basic tasks such as patching vulnerabilities and updating old software. However, as we relate […]
Fujitsu PRIMERGY Sonderaktion CAL4Free
Fujitsu PRIMERGY Sonderaktion CAL4Free Bis zum 31.01.2016 gilt die Sonderaktion unseres Technologiepartners Fujitsu. Zu einem qualifizierten Bundle aus einem Fujitsu PRIMERGY Servers (VFY, sprechen Sie mit uns über das für Sie passende Modell) und einer Microsoft Windows Server Lizenz erhalten Sie kostenfreie Windows Server CAL Lizenzen. Im Einzelnen sind das 5 freie CALs beim Erwerb […]
The Value of Collaboration in Weakening Attackers
By Craig Williams Today’s attackers deploy complex and clever threats that are difficult to combat with just one method of defense. In some cases, defenders must go beyond tools for detecting attacks and devise a different approach for obstructing our adversaries‘ ability to operate. As detailed in the Cisco 2016 Annual Security Report… Source:: Cisco […]

