Security in A World of “WE” – Embracing Our Third Party Ecosystems

By Edna Conway In our increasingly digital world, technological innovation not only presents new opportunities, but also raises new risks and challenges that must be addressed collaboratively by industry, buyers, users, and policymakers. Specifically, digitization demands that risk be addressed across a dramatically expanding supply chain. These risks include the security threats of manipulation, espionage […]

How to post a successful Mantis Request

Source:: Innovaphone

Duo and ISE Integrated Use Case – Delivering Zero Trust security for the workforce and workplace

By Amanda Rogerson This blog series will highlight exciting new developments and integrations between solutions within the Cisco Security portfolio with our acquisition of Duo Security. These posts will cover details about the problems that are being solved by these integrations with links to helpful technical documentation if you are interested in seeing for yourself […]

Find What Your Endpoint Anti-Malware is Missing with CESA Built on Splunk

By Jeff Reed There are many aspects to securing an endpoint beyond finding the malware on it. What do you know about the behavior of your endpoints? Can you track anomalous traffic? Can you tell what the applications and other software processes are up to? What is happening when the device is off the corporate […]

Willkommen bei uns, Tim Spiller

Seit dem 1. September haben wir Azubi-Nachschub. Wir freuen uns auf Dich, Tim Spiller. Tim hat in diesem Jahr sein Abitur am Gummersbacher Lindengymnasium bestanden und schließt nun eine Ausbildung zum Fachinformatiker in unserem Hause an. In seiner Freizeit spielt er gerne mit Freunden Billard und hat bislang Judo und Jiu Jitsu praktiziert. Nach absolviertem […]

Our World in Transition and Our Future Demands

By John N. Stewart October is Cybersecurity Awareness Month and for me, it’s a time to reflect on where we’ve been and how far we’ve come, study the trends and challenges we face today, and look ahead to the next generation of opportunities facing not only the security community, but society at large. In my […]

Threats in encrypted traffic

By Ben Nahorney There was a time when the web was open. Quite literally—communications taking place on the early web were not masked in any significant fashion. This meant that it was fairly trivial for a bad actor to intercept and read the data being transmitted between networked devices. This was especially troublesome when it […]