Black Hat USA 2017: Cisco Umbrella Joins the NOC

By Jessica Bair Cisco Cloud Based Security in the SOC Black Hat USA marked its 20th anniversary this year. The members of the NOC management showed me photos of the original NOC: a single router in a closet. The NOC has grown with the conference; into a well-managed team of experts from around the globe, […]

Black Hat USA 2017: Cisco Umbrella Joins the NOC

By Jessica Bair Cisco Cloud Based Security in the SOC Black Hat USA marked its 20th anniversary this year. The members of the NOC management showed me photos of the original NOC: a single router in a closet. The NOC has grown with the conference; into a well-managed team of experts from around the globe, […]

Windows Server 2016 Angebote prüfen

Sie finden im Internet leider nicht immer seriöse Anbieter vor. Damit Sie bei einer Lizenzprüfung – die im Übrigen seitens Microsoft bereits bei einigen unserer Kunden durchgeführt wurde – nicht vor Probleme gestellt werden, empfehlen wir Ihnen, Windows Server 2016 Angebote immer zu prüfen. Als Ihr Microsoft Partner in der Region erhalten Sie bei uns immer […]

Fortinet Reports Second Quarter 2017 Financial Results

Fortinet Reports Second Quarter 2017 Financial Results Source:: Fortinet

Fortinet Reports Second Quarter 2017 Financial Results

Fortinet Reports Second Quarter 2017 Financial Results Source:: Fortinet

How Adversaries Are Refining and Improving Ransomware in 2017

By Edmund Brumaghin Once adversaries have found a method for breaching network defenses, stealing data, or otherwise generating revenue, they’ll continue to refine these tactics to avoid detection and improve effectiveness. Ransomware, one of the more high-profile tools leveraged by adversaries, has undergone this same evolution, as we explain in the Cisco 2017 Midyear Cybersecurity […]

How Adversaries Are Refining and Improving Ransomware in 2017

By Edmund Brumaghin Once adversaries have found a method for breaching network defenses, stealing data, or otherwise generating revenue, they’ll continue to refine these tactics to avoid detection and improve effectiveness. Ransomware, one of the more high-profile tools leveraged by adversaries, has undergone this same evolution, as we explain in the Cisco 2017 Midyear Cybersecurity […]