How to Quickly Differentiate Between Malicious and Harmless Traffic Using the Cisco Security Packet Analyzer

By Matthew Packer With the constant news headlines about data theft it is mandatory that organizations understand what data is entering, traversing, and leaving their networks and have the ability to examine that data if necessary for conducting network forensic investigations. Two popular style of attacks that are constantly in the news are data hoarding […]

Fireproofing your network with software-defined segmentation

By Andrew Akers We often hear of the many challenges of the industrial revolution, but one of the scourges of this time period that often goes unmentioned was mass fires. To the people of the time, great fires threatened the very viability of industrialization. The number of fires bearing the moniker ‘great‘ helps prove this […]

Fireproofing your network with software-defined segmentation

By Andrew Akers We often hear of the many challenges of the industrial revolution, but one of the scourges of this time period that often goes unmentioned was mass fires. To the people of the time, great fires threatened the very viability of industrialization. The number of fires bearing the moniker ‘great‘ helps prove this […]

Fortinet Expands Security Fabric Visibility and Protection into the Industrial Internet of Things

Fortinet Expands Security Fabric Visibility and Protection into the Industrial Internet of Things Source:: Fortinet

Fortinet Expands Security Fabric Visibility and Protection into the Industrial Internet of Things

Fortinet Expands Security Fabric Visibility and Protection into the Industrial Internet of Things Source:: Fortinet

5 Cyber-Bedrohungen, die jeder Unternehmer kennen sollte

Unser Partner Fortinet hat 5 Bereiche identifiziert, die die Handhabung von Security-Themen im Unternehmensumfeld dramatisch erschweren. Mit diesen Themen sollten sich alle Unternehmer beschäftigen, wenn sie die Herausforderungen im Security-Umfeld verstehen wollen und die möglichen Gefahren für das Unternehmen korrekt einschätzen und bewerten wollen. Das Internet der Dinge, oder IoT Die Adaption von Cloud-Anwendungen Ransomware […]

Threat Spotlight: Follow the Bad Rabbit

By Talos Group Note: This blog post discusses active research by Talos into a new threat. This information should be considered preliminary and will be updated as research continues. On October 24, 2017, Cisco Talos was alerted to a widescale ransomware campaign affecting organizations across eastern Europe and Russia. As was the case in previous […]