Die Auswahl der richtigen Firewall

Eine der größten Herausforderungen für Unternehmen ist die Auswahl der richtigen IT-Security-Komponenten. Der Markt ist hier quasi unüberschaubar und eine Vielzahl Anbieter buhlen um die Budgets. Dabei hat jeder Anbieter die beste Lösung im Portfolio und deren Marketingabteilungen produzieren bunte Statistiken und Whitepaper, um den Kunden zu überzeugen. Orientierung in diesem Dickicht bieten unabhängige Tests, […]

The Real IoT Opportunity for Enterprises? A Chance to Address Security Risks Head On

By Craig Williams When business leaders think about the Internet of Things (IoT), they tend to focus on the potential opportunities for the enterprise and give far less attention to security risks. That’s a mistake. So, too, is believing that the IoT is only a concept on the distant horizon. The IoT already exists and […]

The Real IoT Opportunity for Enterprises? A Chance to Address Security Risks Head On

By Craig Williams When business leaders think about the Internet of Things (IoT), they tend to focus on the potential opportunities for the enterprise and give far less attention to security risks. That’s a mistake. So, too, is believing that the IoT is only a concept on the distant horizon. The IoT already exists and […]

Vulnerability Spotlight: EZB Systems UltraISO ISO Parsing Code Execution Vulnerability

By Talos Group Discovered by Piotr Bania of Cisco Talos Today, Talos is releasing details of a new vulnerability discovered within the EZB Systems UltraISO ISO disk image creator software. TALOS-2017-0342 (CVE-2017-2840) may allow an attacker to execute arbitrary code remotely on the vulnerable system when a specially crafted ISO image is opened and parsed […]

Vulnerability Spotlight: EZB Systems UltraISO ISO Parsing Code Execution Vulnerability

By Talos Group Discovered by Piotr Bania of Cisco Talos Today, Talos is releasing details of a new vulnerability discovered within the EZB Systems UltraISO ISO disk image creator software. TALOS-2017-0342 (CVE-2017-2840) may allow an attacker to execute arbitrary code remotely on the vulnerable system when a specially crafted ISO image is opened and parsed […]

Fortinet Expands Cloud-Based Security Fabric Visibility, Management and Analytics for SMBs and Security Providers

Fortinet Expands Cloud-Based Security Fabric Visibility, Management and Analytics for SMBs and Security Providers Source:: Fortinet

Fortinet Expands Cloud-Based Security Fabric Visibility, Management and Analytics for SMBs and Security Providers

Fortinet Expands Cloud-Based Security Fabric Visibility, Management and Analytics for SMBs and Security Providers Source:: Fortinet