Einträge von Technik Support

Five ways to detect early signs of a breach using the network

By Megha Mehta While organizations would ideally like to do everything they can to block a cybersecurity attack, the reality is that internal and external threats targeting your network can find a way to infiltrate and cause a major breach. So how can you answer questions like – Have we been compromised? What did it […]

Cisco Identity Services Engine wins…again!

By Paul Burdette Last week, for the fourth time in the last five years, Cisco Identity Services Engine (ISE) was recognized as the top solution in the Trust Awards category for Best NAC Solution at the 2020 SC Awards. The announcement was made on Tuesday, February 25, 2020 during the 24th annual SC Awards gala […]

Threat Roundup for February 28 to March 6

By Talos Group Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Feb 28 and Mar 6. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how […]

Enforce Endpoint Compliance and Cyber Hygiene With Duo Device Trust

By Ganesh Umapathy Cisco’s recently released their 2020 CISO Benchmark Report that makes several key recommendations for security professionals to achieve a zero trust vision. The following are a couple of recommendations that are relevant to the discussion in this blog regarding device trust: More than half (52%) of the respondents said that mobile devices […]

Starting Your Microsegmentation journey

By Christina Hausman One of the key challenge’s businesses face is how to provide a secure infrastructure for applications without compromising agility. With the rise of cloud usage, containers, and microservices, many companies choose microsegmentation as the means to protect critical applications from compromise. Choosing a proactive approach to security to build upon their existing […]

Bisonal: 10 years of play

By Talos Group Bisonal is a remote access trojan (RAT) that’s part of the Tonto Team arsenal. The peculiarity of the RAT is that it’s been in use for more than 10 years — this is an uncommon and long period for malware. Over the years, it has evolved and adapted mechanisms to avoid detection […]

Security’s Vicious Cycle

By Barry Fisher Security Reimagined — Solving an Old Problem with a New Approach A decade ago this January, Steve Jobs challenged the conventional wisdom about tablets, unveiling the iPad with the words, “What this device has done is extraordinary.” Coming on the heels of iPhone’s smashing success three years earlier, the tablet, however, wasn’t […]