By Talos Group Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between May 18 and May 25. As with previous round-ups, this post isn’t meant to be an…
Source:: Cisco Security Notice
By Talos Group Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between May 18 and May 25. As with previous round-ups, this post isn’t meant to be an…
Source:: Cisco Security Notice
By Munawar Hossain In the last few years we have seen a fundamental shift in cybercriminal tactics leveraging social engineering techniques. Among the most effective of these techniques are phishing attacks, where cybercriminals…
Source:: Cisco Security Notice
By Munawar Hossain In the last few years we have seen a fundamental shift in cybercriminal tactics leveraging social engineering techniques. Among the most effective of these techniques are phishing attacks, where cybercriminals…
Source:: Cisco Security Notice
By Talos Group Intro For several months, Talos has been working with public- and private-sector threat intelligence partners and law enforcement in researching an advanced, likey state-sponsored or state-affiliated actor’s widespread use…
Source:: Cisco Security Notice
By Talos Group Intro For several months, Talos has been working with public- and private-sector threat intelligence partners and law enforcement in researching an advanced, likey state-sponsored or state-affiliated actor’s widespread use…
Source:: Cisco Security Notice
By Michelle Dennedy It’s here. The much anticipated, oft-discussed, enforcement date of May 25 for the EU General Data Protection Regulation (GDPR) has arrived.
Source:: Cisco Security Notice
By Michelle Dennedy It’s here. The much anticipated, oft-discussed, enforcement date of May 25 for the EU General Data Protection Regulation (GDPR) has arrived.
Source:: Cisco Security Notice
Heute gibt es die erste Aufzeichnung der diesjährigen Sicherheitskonferenz Troopers. Wir waren wieder gerne vor Ort und haben alle Augen und Ohren offen gehalten, um aktuelle Themen und Trends im Sicherheitsumfeld aus den Bereichen Unternehmen, Forschung, Lehre und Hacking für Euch mitzubringen.
Dr. Kelley Misata und Diana Kelley haben einen spannenden Vortrag zum Thema Sprachgebrauch im Security-Umfeld gehalten. Eigentlich ist das ein „Wachrüttler“ auch für uns, denn viel zu oft verlieren wir uns ja im Alltagsgeschäft in einer technischen Ausdrucksweise, die für Euch nicht immer leicht zugänglich ist.
Hier unser Angebot: Lasst uns Eure Fragen zukommen und wir beantworten diese in „Normalsprache“, ohne Fach-Chinesisch.
By Nick Kelly Organizations that engage in M&A should include an information security strategy as part of the process.
Source:: Cisco Security Notice
By Nick Kelly Organizations that engage in M&A should include an information security strategy as part of the process.
Source:: Cisco Security Notice