Phishing for Threat Intelligence: Using Your Spam Quarantine for the Greater Good

By Erik Iker Effectively protecting your assets increasingly involves effective threat intelligence to better understand the types of attackers targeting your sector, and what your vulnerabilities are. Lack of any threat intelligence at all, or even the foresight to use Google and Twitter to spot fake scams trending in top results can result in a […]

BSI-Info zu ICS: Top 10 Bedrohungen und Gegenmaßnahmen

Eine aktuelle Information der Allianz für Cybersicherheit, der auch Oberberg-Online angehört: Automatisierungs-, Prozesssteuerungs- und -leitsysteme – subsumiert unter dem BegriffIndustrial Control Systems (ICS) – werden in nahezu allen Infrastrukturen eingesetzt, die physische Prozesse abwickeln – von der Stromerzeugung und -verteilung über Gas- und Wasserversorgung bis hin zur Produktion, Verkehrsleittechnik und modernem Gebäudemanagement. Dabei wurden in […]

ETSI/IQC’s 4th Workshop on Quantum-Safe Cryptography

By Panos Kampanakis Quantum computers could break commonly used public key algorithms, which would affect cryptography used today. For that reason, there has been great attention on quantum safe crypto recently. We have blogged about it in numerous occasions [1], [2] , [3]. In that context, last week the 4th ETSI/IQC on Quantum-Safe Cryptography in […]

ETSI/IQC’s 4th Workshop on Quantum-Safe Cryptography

By Panos Kampanakis Quantum computers could break commonly used public key algorithms, which would affect cryptography used today. For that reason, there has been great attention on quantum safe crypto recently. We have blogged about it in numerous occasions [1], [2] , [3]. In that context, last week the 4th ETSI/IQC on Quantum-Safe Cryptography in […]

Tech-Channel – Innovaphone Telefonbuch #17

Egal ob Microsoft Dynamics CRM/NAV/AX/CRM Online, SAP CRM/R3/Business One, Salesforce, Office365, DATEV pro und viele ERP-, CRM-, Branchen- und Groupware-Lösungen mehr. Mit dem MetaDirectory können Sie einfach und schnell alle von Ihrem Unternehmen verwendeten Kontaktdatenquellen in einem zentralen Verzeichnis zusammen führen. Das MetaDirectory ist ein LDAP-Server für schnellen Zugriff auf Kontaktdaten. Es führt unterschiedliche Datenbanken […]

Simpler NGFW management – let’s you get home in time for dinner

By Jason Lamar “Call me anything you want, but just don’t call me late for dinner.” I wonder how many of us are familiar with this old quote. Security management often burdens teams to put in extra cycles to get the most appropriate access and security policies in place. The process too often isn’t simple […]

Simpler NGFW management – let’s you get home in time for dinner

By Jason Lamar “Call me anything you want, but just don’t call me late for dinner.” I wonder how many of us are familiar with this old quote. Security management often burdens teams to put in extra cycles to get the most appropriate access and security policies in place. The process too often isn’t simple […]