By Talos Group Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between May 18 and May 25. As with previous round-ups, this post isn’t meant to be an

Source:: Cisco Security Notice

By Munawar Hossain In the last few years we have seen a fundamental shift in cybercriminal tactics leveraging social engineering techniques. Among the most effective of these techniques are phishing attacks, where cybercriminals

Source:: Cisco Security Notice

By Munawar Hossain In the last few years we have seen a fundamental shift in cybercriminal tactics leveraging social engineering techniques. Among the most effective of these techniques are phishing attacks, where cybercriminals

Source:: Cisco Security Notice

By Talos Group Intro For several months, Talos has been working with public- and private-sector threat intelligence partners and law enforcement in researching an advanced, likey state-sponsored or state-affiliated actor’s widespread use

Source:: Cisco Security Notice

By Talos Group Intro For several months, Talos has been working with public- and private-sector threat intelligence partners and law enforcement in researching an advanced, likey state-sponsored or state-affiliated actor’s widespread use

Source:: Cisco Security Notice

By Michelle Dennedy It’s here. The much anticipated, oft-discussed, enforcement date of May 25 for the EU General Data Protection Regulation (GDPR) has arrived.

Source:: Cisco Security Notice

By Michelle Dennedy It’s here. The much anticipated, oft-discussed, enforcement date of May 25 for the EU General Data Protection Regulation (GDPR) has arrived.

Source:: Cisco Security Notice

Heute gibt es die erste Aufzeichnung der diesjährigen Sicherheitskonferenz Troopers. Wir waren wieder gerne vor Ort und haben alle Augen und Ohren offen gehalten, um aktuelle Themen und Trends im Sicherheitsumfeld aus den Bereichen Unternehmen, Forschung, Lehre und Hacking für Euch mitzubringen.

Dr. Kelley Misata und Diana Kelley haben einen spannenden Vortrag zum Thema Sprachgebrauch im Security-Umfeld gehalten. Eigentlich ist das ein „Wachrüttler“ auch für uns, denn viel zu oft verlieren wir uns ja im Alltagsgeschäft in einer technischen Ausdrucksweise, die für Euch nicht immer leicht zugänglich ist.

Hier unser Angebot: Lasst uns Eure Fragen zukommen und wir beantworten diese in „Normalsprache“, ohne Fach-Chinesisch.

 

 

 

By Nick Kelly Organizations that engage in M&A should include an information security strategy as part of the process.

Source:: Cisco Security Notice

By Nick Kelly Organizations that engage in M&A should include an information security strategy as part of the process.

Source:: Cisco Security Notice