Building Bridges to Our Customers – Michelle Dennedy, Michelle Fleury, Edna Conway Win 2016 Golden Bridge Awards
By John N. Stewart I have an incredible team, and we achieve incredible things together. It’s rewarding to see each and every one of them succeed, and for that success to be realized externally. Today, I’m proud to share that the 2016 Golden Bridge Business and Innovation Awards recognized three members of our Cisco Security […]
Microsoft Patch Tuesday – August 2016
By Talos Group This post was authored by Edmund Brumaghin and Jonah Samost Today is Patch Tuesday for August 2016, and Microsoft has released several security bulletins and associated patches to resolve security issues across their products. This month’s patch release includes 9 bulletins addressing 28 vulnerabilities. Five of the bulletins Microsoft has released are […]
Microsoft Patch Tuesday – August 2016
By Talos Group This post was authored by Edmund Brumaghin and Jonah Samost Today is Patch Tuesday for August 2016, and Microsoft has released several security bulletins and associated patches to resolve security issues across their products. This month’s patch release includes 9 bulletins addressing 28 vulnerabilities. Five of the bulletins Microsoft has released are […]
The Have’s & Have Not’s: Threat Management Maturity
By Sean Mason IT departments regularly ask us questions about their security posture, their security concerns, and specifically, the makeup of their Threat Management (TM) organizations. Generally speaking, Threat Management includes anything in the Intel-Detection-Response arena, generally encompassing Security Operations Centers, Intelligence Organizations, and Incident Response Teams. When it comes to the makeup of their […]
The Have’s & Have Not’s: Threat Management Maturity
By Sean Mason IT departments regularly ask us questions about their security posture, their security concerns, and specifically, the makeup of their Threat Management (TM) organizations. Generally speaking, Threat Management includes anything in the Intel-Detection-Response arena, generally encompassing Security Operations Centers, Intelligence Organizations, and Incident Response Teams. When it comes to the makeup of their […]
Windows 7 bald nicht mehr vorinstalliert erhältlich
Windows 7 bald nicht mehr vorinstalliert erhältlich Alle PC-Hersteller dürfen nur noch bis zum 31.10.2016 Client-Systeme mit vorinstalliertem Windows 7 Betriebssystem ausliefern. Um die Verfügbarkeit bis zum 31.10.2016 sicherzustellen, können wir Ihre Orders für FUJITSU-PCs und Notebooks verbindlich nur noch bis zum 30.09.2016 entgegennehmen. Danach gilt die Lieferbarkeit lediglich noch für verfügbare Lagerware beim Distributor. FUJITSU […]
The General Behavior of Ransomware
By Eric Hulse This is the first in a series of blogs about advanced malware Behavioral Indicators Morph Over Time A large part of Threat Grid’s efficacy in determining the nature of a submitted file is through the use of over 675 indicators to identify malware. The initial indicators created for AMP Threat Grid sought […]