By Evgeny Mirolyubov Our engineering and research team work 24/7 to ensure business continuity for our customers. Here are the most recent new features and capabilities released for the AMP for Endpoints Console.

Source:: Cisco Security Notice

By Thu T. Pham Threats to energy and utilities firms target enterprise IT networks – here is a breakdown of the most common attack scenarios and how to effectively mitigate against remote access risks.

Source:: Cisco Security Notice

By Talos Group DNSpionage Campaign Targets Middle East This blog post was authored by Warren Mercer and Paul Rascagneres. Executive Summary Cisco Talos recently discovered a new campaign targeting Lebanon and the United

Source:: Cisco Security Notice

By Jeff Moncrief Amazon Web Services (AWS) provides numerous benefits to customers, allowing companies to be more responsive, available, and cost-efficient. It also provides a number of security capabilities, including strong identity and

Source:: Cisco Security Notice

Herzlich willkommen im Team, Marco Ufer.

Unser neuer Auszubildender zum Fachinformatiker ist bereits Informationstechnischer Assistent und damit ab dem ersten Tag im Einsatz. In seiner Freizeit ist Marco aktives Mitglied im Windhagener Schützenverein und ausgebildeter Ersthelfer.

Mit Marco bekommt unser bisher einziger Playstation-Nutzer Jan nun endlich Verstärkung.

Wir wünschen viel Erfolg und Freude bei der Ausbildung in unserem Hause.

By Jessica Bair MobileIron was one of the first integration partners with Cisco Security Connector (CSC) for supervised iOS devices.

Source:: Cisco Security Notice

By Talos Group Cisco Talos is disclosing multiple vulnerabilities in the TP-Link TL-R600VPN router. TP-Link produces a number of different types of small and home office (SOHO) routers. Talos discovered several bugs in

Source:: Cisco Security Notice

By Talos Group Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Nov. 09 and Nov. 16. As with previous roundups, this post isn’t meant to be an

Source:: Cisco Security Notice

By Andrew Akers Detecting threats, such as malware, rogue insiders, and credential abuse, within public cloud environments can be a major challenge. Traditionally, organizations have tried to solve this problem by overlaying a

Source:: Cisco Security Notice