Cyber Threat Alliance Releases Cryptomining Whitepaper

By Talos Group Despite the recent devaluation of some cryptocurrencies, illicit cryptocurrency miners remain a lucrative and widespread attack vector in the threat landscape. These miners are easy to deploy, and attackers see… Source:: Cisco Security Notice

Disaster Recovery – haben Sie vorgesorgt?

Disaster Recovery – haben Sie vorgesorgt? Eine verlässliche Disaster-Recovery-Lösung ist wichtig, um im Falle des Falles die lückenlose Fortführung Ihres Geschäftsbetriebes gewährleisten zu können – 24/7, unterbrechungsfrei und ohne Datenverlust. Der ETERNUS Snapshot Manager (ESM) unseres Partners  Fujitsu ist eine solche Lösung. Er hilft Ihnen, Ihre Daten bestmöglich abzusichern und im Ernstfall eine direkte Notfallwiederherstellung zu starten. Er […]

Threat Grid Cloud updates, summer 2018

By Ben Greenbaum Every month, the Threat Grid development team brings you new features and capabilities in the Threat Grid cloud, and these past summer months were no different. Source:: Cisco Security Notice

Threat Grid Cloud updates, summer 2018

By Ben Greenbaum Every month, the Threat Grid development team brings you new features and capabilities in the Threat Grid cloud, and these past summer months were no different. Source:: Cisco Security Notice

Threat Roundup for September 7 to September 14

By Talos Group Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between September 7 and September 14. As with previous round-ups, this post isn’t meant to be an… Source:: Cisco Security Notice

Threat Roundup for September 7 to September 14

By Talos Group Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between September 7 and September 14. As with previous round-ups, this post isn’t meant to be an… Source:: Cisco Security Notice

Status: Verified. Cisco AMP for Endpoints Hits the Mark

By Neil Patel Many times, when people think of the term “Next Generation Endpoint Security” they are thinking about a list of capabilities, preventative engines, detection mechanisms, and response capabilities. With so many elements,… Source:: Cisco Security Notice