Why download the exploit, when you can carry it with you?

By Jessica Bair For the 2nd year, RSA Conference 2018 APJ created an educational exhibit, sponsored by RSA and Cisco, to monitor the RSA Conference public Wi-Fi network provided by the Marina Bay Sands (MBS). Source:: Cisco Security Notice

Why download the exploit, when you can carry it with you?

By Jessica Bair For the 2nd year, RSA Conference 2018 APJ created an educational exhibit, sponsored by RSA and Cisco, to monitor the RSA Conference public Wi-Fi network provided by the Marina Bay Sands (MBS). Source:: Cisco Security Notice

Exploitable or Not Exploitable? Using REVEN to Examine a NULL Pointer Dereference.

By Talos Group It can be very time-consuming to determine if a bug is exploitable or not. In this post, we’ll show how to decide if a vulnerability is exploitable by tracing back… Source:: Cisco Security Notice

Exploitable or Not Exploitable? Using REVEN to Examine a NULL Pointer Dereference.

By Talos Group It can be very time-consuming to determine if a bug is exploitable or not. In this post, we’ll show how to decide if a vulnerability is exploitable by tracing back… Source:: Cisco Security Notice

techconsult empfiehlt den Champion G DATA

Seit mehr als 15 Jahren ist Oberberg-Online G DATA Partner und empfiehlt seinen Kunden die Software des Antivirus-Pioniers aus Deutschland. Von kleinen Handwerksbetrieben bis hin zu großen Mittelständlern vertrauen viele unserer Geschäftspartner auf die Expertise der G DATA Techniker unseres Hauses. Für die unabhängige Studie hat die techconsult GmbH 2.000 Nutzer von Unternehmenslösungen befragt, wie […]

How We Apply Machine Learning in Cisco Advanced Threat Solutions

By Joe Malenfant There is a lot of talk lately about machine learning when it comes to cyber security. It seems like you can’t have a conversation about one without the other…. Source:: Cisco Security Notice

How We Apply Machine Learning in Cisco Advanced Threat Solutions

By Joe Malenfant There is a lot of talk lately about machine learning when it comes to cyber security. It seems like you can’t have a conversation about one without the other…. Source:: Cisco Security Notice