By Marty Loy Cisco developed Next Generation Encryption (NGE) in 2011. NGE was created to define a widely accepted and consistent set of cryptographic algorithms that provide strong security and good performance for our customers. These are the best standards that can be implemented today to meet the security and scalability requirements for network security in the years to come; or to interoperate with the cryptography that will be deployed in that time frame. Most importantly, all of the NGE algorithms, parameters, and key-sizes are widely believed []

Source:: Cisco Security Notice

Fortinet Elevates High-Performance Cybersecurity to the Access Layer

Source:: Fortinet

Fortinet Elevates High-Performance Cybersecurity to the Access Layer

Source:: Fortinet

By Anthony Grieco As we continue to observe National Cyber Security Awareness Month, it’s time this week to think about integrity verification and what it means for your network and your organization. As today’s network threats increase in sophistication, the resulting risks to a business’s or government agency’s network may go undetected for days, months or even years. According to the Ponemon Institute’s 2015 Cost of Data Breach Study, malicious attacks take an average of 256 days to identify. The same network that []

Source:: Cisco Security Notice

By Anthony Grieco As we continue to observe National Cyber Security Awareness Month, it’s time this week to think about integrity verification and what it means for your network and your organization. As today’s network threats increase in sophistication, the resulting risks to a business’s or government agency’s network may go undetected for days, months or even years. According to the Ponemon Institute’s 2015 Cost of Data Breach Study, malicious attacks take an average of 256 days to identify. The same network that []

Source:: Cisco Security Notice

By Martin Rehak Post authored by Martin Rehak, Veronica Valeros, Martin Grill and Ivan Nikolaev. In order to complement the comprehensive information about the Angler exploit kit from our Talos colleagues [ Talos Intel: Angler Exposed ], let’s have a very brief look at what an Angler and CryptoWall infection looks like from the network perspective. We will present one of the recent Angler incidents discovered by Cognitive Threat Analytics (CTA). Cognitive Threat Analytics works after the attack. It sifts through the logs produced by the client’s []

Source:: Cisco Security Notice

By Martin Rehak Post authored by Martin Rehak, Veronica Valeros, Martin Grill and Ivan Nikolaev. In order to complement the comprehensive information about the Angler exploit kit from our Talos colleagues [ Talos Intel: Angler Exposed ], let’s have a very brief look at what an Angler and CryptoWall infection looks like from the network perspective. We will present one of the recent Angler incidents discovered by Cognitive Threat Analytics (CTA). Cognitive Threat Analytics works after the attack. It sifts through the logs produced by the client’s []

Source:: Cisco Security Notice

Industrie 4.0 – Schutz für Ihre Infrastruktur

Industrie 4.0 – Was ist das eigentlich? Nach der Mechanisierung, der Arbeitsteilung und Massenproduktion, dem Einsatz von Mikroprozessoren in der Produktion bewegen wir uns in Richtung der Cyber-physischen Systeme. Dies geht einher mit dem Wandel von der klassischen Steuerungsstruktur – mit aufeinander aufbauenden Ebenen -, hin zu vermaschten und flexibel vernetzten Steuerungssystemen (Jeder mit Jedem).

Das dieser Wandel neue Bedrohungen für Ihre Infrastruktur bedeutet, ist heute keine Fiktion mehr. Zahlreiche Artikel – auch in deutschen Medien – verdeutlichen, dass die Probleme eben nicht weit weg existieren, sondern bereits hier sind. Erfahren Sie mehr über das Thema im Mitschnitt des Vortrages von Dirk Wollberg, anlässlich unseres Oberberg-Online Security Updates am 16.09.2015.

Gerne stehen auch wir Ihnen bei Fragen zum Thema zur Verfügung unter 02261 915500 oder vertrieb@oberberg.net

Details und den kompletten Vortrag gibt es hier:
Präsentation zum Thema als PDF-Download