Einträge von Technik Support

Walking the Tightrope of Security and Usability

By Khelan Bhatt Here at the RSA Conference 2016, the theme this year is Connect to Protect. It is a fitting theme for a gathering of security professionals, given the widespread adoption of cloud and mobile technologies that make doing business and sharing information easier than ever. The need for securing data regardless of where […]

Walking the Tightrope of Security and Usability

By Khelan Bhatt Here at the RSA Conference 2016, the theme this year is Connect to Protect. It is a fitting theme for a gathering of security professionals, given the widespread adoption of cloud and mobile technologies that make doing business and sharing information easier than ever. The need for securing data regardless of where […]

Digitization Compels a Fresh Approach to Network Security

By Andrew Peters We know that organizations today must digitize to thrive, with the CIO and IT teams at the helm of the transformational journey. Why does this matter? Because businesses must find ways to deliver more modern business operations as well as satisfying customer and workplace experiences or quickly fall behind their digitized competitors. […]

Digitization Compels a Fresh Approach to Network Security

By Andrew Peters We know that organizations today must digitize to thrive, with the CIO and IT teams at the helm of the transformational journey. Why does this matter? Because businesses must find ways to deliver more modern business operations as well as satisfying customer and workplace experiences or quickly fall behind their digitized competitors. […]

Cisco Firepower Management Center Brings Security Into Focus

By Joseph O’Laughlin IT Teams gain insight and focus with the industry’s most comprehensive NGFW management – before, during and after attacks. As we discussed in our last two posts, most organizations today secure their networks using disparate technologies that are unable to work together. Legacy NGFWs are not threat-focused but rather focused rather on […]

Cisco Firepower Management Center Brings Security Into Focus

By Joseph O’Laughlin IT Teams gain insight and focus with the industry’s most comprehensive NGFW management – before, during and after attacks. As we discussed in our last two posts, most organizations today secure their networks using disparate technologies that are unable to work together. Legacy NGFWs are not threat-focused but rather focused rather on […]

Angler Attempts to Slip the Hook

By Talos Group This post was authored by Nick Biasini with contributions from Joel Esler and Melissa Taylor Talos has discussed at length the sophistication of the Angler exploit kit. One thing that always makes Angler stand apart is the speed with which they develop and implement new techniques. Whether its domain shadowing, 302 cushioning, […]

Angler Attempts to Slip the Hook

By Talos Group This post was authored by Nick Biasini with contributions from Joel Esler and Melissa Taylor Talos has discussed at length the sophistication of the Angler exploit kit. One thing that always makes Angler stand apart is the speed with which they develop and implement new techniques. Whether its domain shadowing, 302 cushioning, […]