Why phishing attacks still win and what you can do about it, Part I
By Munawar Hossain In the last few years we have seen a fundamental shift in cybercriminal tactics leveraging social engineering techniques. Among the most effective of these techniques are phishing attacks, where cybercriminals… Source:: Cisco Security Notice
VPNFilter
By Talos Group Intro For several months, Talos has been working with public- and private-sector threat intelligence partners and law enforcement in researching an advanced, likey state-sponsored or state-affiliated actor’s widespread use… Source:: Cisco Security Notice
VPNFilter
By Talos Group Intro For several months, Talos has been working with public- and private-sector threat intelligence partners and law enforcement in researching an advanced, likey state-sponsored or state-affiliated actor’s widespread use… Source:: Cisco Security Notice
Hello, GDPR Enforcement
By Michelle Dennedy It’s here. The much anticipated, oft-discussed, enforcement date of May 25 for the EU General Data Protection Regulation (GDPR) has arrived. Source:: Cisco Security Notice
Hello, GDPR Enforcement
By Michelle Dennedy It’s here. The much anticipated, oft-discussed, enforcement date of May 25 for the EU General Data Protection Regulation (GDPR) has arrived. Source:: Cisco Security Notice
Sicherheitsthemen ohne Fach-Chinesisch?
Heute gibt es die erste Aufzeichnung der diesjährigen Sicherheitskonferenz Troopers. Wir waren wieder gerne vor Ort und haben alle Augen und Ohren offen gehalten, um aktuelle Themen und Trends im Sicherheitsumfeld aus den Bereichen Unternehmen, Forschung, Lehre und Hacking für Euch mitzubringen. Dr. Kelley Misata und Diana Kelley haben einen spannenden Vortrag zum Thema Sprachgebrauch […]
The Importance of an Information Security Strategy in Mergers and Acquisitions
By Nick Kelly Organizations that engage in M&A should include an information security strategy as part of the process. Source:: Cisco Security Notice