Threat Spotlight: Spin to Win…Malware

By Talos Group This post was authored by Nick Biasini with contributions from Tom Schoellhammer and Emmanuel Tacheau The threat landscape is ever changing and adversaries are always working to find more efficient ways to compromise users. One of the many ways that users are driven to malicious content is through malicious advertisements known as […]

Threat Spotlight: Spin to Win…Malware

By Talos Group This post was authored by Nick Biasini with contributions from Tom Schoellhammer and Emmanuel Tacheau The threat landscape is ever changing and adversaries are always working to find more efficient ways to compromise users. One of the many ways that users are driven to malicious content is through malicious advertisements known as […]

Innovaphone V12 Zertifizierung – check.

Innovaphone V12 Zertifizierung – check. Die technischen Kollegen der Oberberg-Online haben die Zertifizierungsprüfung für die neueste Innovaphone Telefonanlagen-Version PBX V12 absolviert und mit Auszeichnung bestanden. Herzlichen Glückwunsch. In der Version 12 wurde vor allen Dingen die ohnehin bereits werksseitig implementierte Sicherheitstechnologie noch einmal massiv erweitert. Themen sind hier der Session Border Controller und der Reverse […]

The Changing Face of the Healthcare Security Leader

By Richard Staynings If you worked with just about any hospital or healthcare provider a mere ten years ago you may have come across the Information Security Manager, Director of Security and Compliance, or someone who filled this role under another title. Their role was to lead ‘IT Security‘ and manage a small staff of […]

The Changing Face of the Healthcare Security Leader

By Richard Staynings If you worked with just about any hospital or healthcare provider a mere ten years ago you may have come across the Information Security Manager, Director of Security and Compliance, or someone who filled this role under another title. Their role was to lead ‘IT Security‘ and manage a small staff of […]

5 Steps to an Effective Data Incident Response Program

By Michelle Fleury All organizations depend, at least in part, on their data to carry out day-to-day operations. Yet new, high-profile data breaches are reported every week, and the costs of those breaches continue to rise The core elements of an incident response program are straightforward and quick to establish. Let’s take a look at […]

5 Steps to an Effective Data Incident Response Program

By Michelle Fleury All organizations depend, at least in part, on their data to carry out day-to-day operations. Yet new, high-profile data breaches are reported every week, and the costs of those breaches continue to rise The core elements of an incident response program are straightforward and quick to establish. Let’s take a look at […]