Seeing Over the Wall: Unified TrustSec-ACI Policy Monitoring with Stealthwatch and ISE v2.1

By Matthew Robertson Visibility has always been a core component of building effective security policy. Starting with the discovery phase of understanding the behavior of the users and assets on a network through the effective monitoring of the policy once the policy is implemented. Through the collection and analysis of NetFlow data from the network infrastructure Cisco Stealthwatch […]

Source:: Cisco Security Notice

Seeing Over the Wall: Unified TrustSec-ACI Policy Monitoring with Stealthwatch and ISE v2.1

By Matthew Robertson Visibility has always been a core component of building effective security policy. Starting with the discovery phase of understanding the behavior of the users and assets on a network through the effective monitoring of the policy once the policy is implemented. Through the collection and analysis of NetFlow data from the network infrastructure Cisco Stealthwatch […]

Source:: Cisco Security Notice

Willkommen im Team – Unsere Azubis 2016

Herzlich willkommen im Team bei Oberberg-Online.

Zum 1.8.2016 haben wir zwei neue Auszubildende an Bord genommen.

E-Strauch-NewsM-Eck-News

Evelyn Strauch startet Ihre Ausbildung zur Kauffrau für Bürokommunikation und Maik Eck ist unser neuer Azubi als Fachinformatiker. Wir wünschen Euch einen guten Start bei uns und freuen uns auf die nächsten Jahre mit Euch. Wenn irgendwo etwas klemmt – einfach Fragen stellen und wir helfen gerne weiter.

Auf eine gute Zeit,

Eure Onliner

 

 

MITM Training at Black Hat USA 2016

By Leonardo Nve To prevent a security breach and loss of critical business data, security teams must be diligent in defining, identifying, and classifying security gaps in their organization’s network. Many security teams conduct pentesting as a way to assess and mitigate any potential gaps. As a consulting engineer for Cisco Security Services, I’ve observed a deeper understanding […]

Source:: Cisco Security Notice

MITM Training at Black Hat USA 2016

By Leonardo Nve To prevent a security breach and loss of critical business data, security teams must be diligent in defining, identifying, and classifying security gaps in their organization’s network. Many security teams conduct pentesting as a way to assess and mitigate any potential gaps. As a consulting engineer for Cisco Security Services, I’ve observed a deeper understanding […]

Source:: Cisco Security Notice

A “quick” guide to QUIC

By Catherine (Kate) Pearce Intelligence Gathering 101 Traffic analysis is rapidly becoming critical for threat analysis and incident response teams, and a choke point on their capability to be effective. Performing analysis on incoming threats requires security professionals to have monitoring tools that can give them an understanding of the information coming and going into their environment. This understanding […]

Source:: Cisco Security Notice

A “quick” guide to QUIC

By Catherine (Kate) Pearce Intelligence Gathering 101 Traffic analysis is rapidly becoming critical for threat analysis and incident response teams, and a choke point on their capability to be effective. Performing analysis on incoming threats requires security professionals to have monitoring tools that can give them an understanding of the information coming and going into their environment. This understanding […]

Source:: Cisco Security Notice