By Vinny Parla Users on the network are an important layer of an organization’s security strategy – and a particularly vulnerable one. In fact, a recent IBM cybersecurity report found that human error was a contributing factor in 95% of all security incidents! It is critical to know what users are doing on the network, especially since some potential high-risk behaviors like data disclosure and shadow IT may not trigger current security layers (e.g. malware protection). Cisco AnyConnect Network Visibility Module (NVM) empowers []

Source:: Cisco Security Notice

By Vinny Parla Users on the network are an important layer of an organization’s security strategy – and a particularly vulnerable one. In fact, a recent IBM cybersecurity report found that human error was a contributing factor in 95% of all security incidents! It is critical to know what users are doing on the network, especially since some potential high-risk behaviors like data disclosure and shadow IT may not trigger current security layers (e.g. malware protection). Cisco AnyConnect Network Visibility Module (NVM) empowers []

Source:: Cisco Security Notice

Source:: Innovaphone

Source:: Innovaphone

Source:: Innovaphone

Source:: Innovaphone

Ein frohes Weihnachtsfest vom Team der Oberberg-Online

Allen Kunden, Interessenten und Freunden unseres Hauses danken wir ganz herzlich für das ausgesprochene Vertrauen und wünschen Ihnen und Ihren Familien eine friedvolle und frohe Weihnacht. Genießen Sie die ruhigeren Tage und kommen Sie gut ins neue Jahr.

Für 2016 wünschen wir Gesundheit und Freude. Das Team der Oberberg-Online freut sich auf die vertrauensvolle Zusammenarbeit mit Ihnen im neuen Jahr.

wfeier1-900px-web

Die Redaktion gönnt sich eine kleine Weihnachtspause. Der nächste Beitrag erscheint am 5. Januar im neuen Jahr.

By Anthony Grieco Following a recent Juniper security bulletin discussing unauthorized code, we have fielded a number of related questions from our customers. Being trustworthy, transparent, and accountable is core to our team, so we are responding to these questions publicly. First, we have a “no backdoor” policy and our principles are published at trust.cisco.com Our development practices specifically prohibit any intentional behaviors or product features designed to allow unauthorized device or network access, exposure of sensitive device information, or a bypass of security features or restrictions. These include, but []

Source:: Cisco Security Notice

By Anthony Grieco Following a recent Juniper security bulletin discussing unauthorized code, we have fielded a number of related questions from our customers. Being trustworthy, transparent, and accountable is core to our team, so we are responding to these questions publicly. First, we have a “no backdoor” policy and our principles are published at trust.cisco.com Our development practices specifically prohibit any intentional behaviors or product features designed to allow unauthorized device or network access, exposure of sensitive device information, or a bypass of security features or restrictions. These include, but []

Source:: Cisco Security Notice

By Mike Storm This is Part 3 of our blog series about NG-Firewalls. See Part 1 here . Part 3: Challenges of the Typical NGFW What good is a malicious verdict on something that had already penetrated the system? There is no system in the world that can stop 100% of attacks/attackers 100% of the time, so infection is an inevitability that must be anticipated. Something WILL get through and when it does, the quality of your threat system and incident response plan will []

Source:: Cisco Security Notice