By Talos Group Tax time in the US is quickly approaching. Everyone should be on the lookout for scams that are designed to trick you out of your money and personal information. The IRS is warning users about an increase in the number of email scams being used this year. However, these attacks are no longer limited to just the United States. Earlier this year we notice tax phishing campaigns targeting Ireland. Therefore, we decided to take a look back over the last year []

Source:: Cisco Security Notice

By Michelle Dennedy As RSA Conference 2016 draws near, I’m excited to see that privacy is at last getting its day in the sun. This topic has often seemed like an after-market add-on at the conference in previous years. Last year, in fact, most of the booths at RSAC were touting the fact that they had security AND privacy, but when pressed, privacy usually meant encryption. Fortunately, that has changed. Why? The huge data breaches of last year, particularly those affecting the healthcare industry and the []

Source:: Cisco Security Notice

By Michelle Dennedy As RSA Conference 2016 draws near, I’m excited to see that privacy is at last getting its day in the sun. This topic has often seemed like an after-market add-on at the conference in previous years. Last year, in fact, most of the booths at RSAC were touting the fact that they had security AND privacy, but when pressed, privacy usually meant encryption. Fortunately, that has changed. Why? The huge data breaches of last year, particularly those affecting the healthcare industry and the []

Source:: Cisco Security Notice

Oberberg-Online nimmt an Allianz für Cyber-Sicherheit teil

Die Allianz für Cyber-Sicherheit ist eine Initiative des Bundesamtes für Sicherheit in der Informationstechnik (BSI), die im Jahr 2012 in Zusammenarbeit mit dem Bundesverband Informationswirtschaft, Telekommunikation und neue Medien e.V. (BITKOM) gegründet wurde.

Maßgebliches Ziel dieser Allianz ist die Erhöhung der Cyber-Sicherheit in Deutschland. Dazu wird ein stetig aktualisiertes Lagebild vorgehalten. Hintergrundinformationen und Lösungshinweise für Teilnehmer dienen der Verbesserung der Sicherheit von Unternehmen und Organisationen.

Oberberg-Online nimmt an der Allianz für Cyber-Sicherheit teil, um Erfahrungen auszutauschen und neue Erkenntnisse für die eigenen Kunden zu erlangen.

 

Die Broschüre der Allianz für Cyber-Sicherheit finden Sie hier.

Zur Webseite der Allianz für Cyber-Sicherheit geht es hier.

 

 

By Eric Wenger Recently, I had the opportunity to participate on a panel discussion of Internet of Things (IoT) privacy and security at the Consumer Electronics Show in Las Vegas. This week, Barcelona plays host to the 2016 Mobile World Congress, where technology leaders convene to discuss what’s next in the mobile industry. Both events point to a future in which Internet-enabled devices are ubiquitous. We cannot yet see exactly how our lives will change as a result of this next wave of innovation. What is clear, []

Source:: Cisco Security Notice

By Eric Wenger Recently, I had the opportunity to participate on a panel discussion of Internet of Things (IoT) privacy and security at the Consumer Electronics Show in Las Vegas. This week, Barcelona plays host to the 2016 Mobile World Congress, where technology leaders convene to discuss what’s next in the mobile industry. Both events point to a future in which Internet-enabled devices are ubiquitous. We cannot yet see exactly how our lives will change as a result of this next wave of innovation. What is clear, []

Source:: Cisco Security Notice

By Sam Rastogi Massive digital transformation is creating significant new opportunities for service providers. The number of Internet connected devices will grow from 15 billion today to 500 billion by 2030. The rise of cloud computing is a game-changer in service provider architecture and service delivery resulting in greater efficiency, capacity and reduced costs. Unfortunately, this means that as modern networks evolve, the attack surface that service providers must protect is expanding. Financially motivated attackers recognize the opportunity and devise sophisticated methods to []

Source:: Cisco Security Notice

By Sam Rastogi Massive digital transformation is creating significant new opportunities for service providers. The number of Internet connected devices will grow from 15 billion today to 500 billion by 2030. The rise of cloud computing is a game-changer in service provider architecture and service delivery resulting in greater efficiency, capacity and reduced costs. Unfortunately, this means that as modern networks evolve, the attack surface that service providers must protect is expanding. Financially motivated attackers recognize the opportunity and devise sophisticated methods to []

Source:: Cisco Security Notice

By Edna Conway Security threats are varied and often unpredictable. We are faced with an expanding attack surface. Adversaries abound, spanning organized crime, nation-states and malicious insiders. It is against this backdrop that the IT solutions lifecycle may appear to be an “unharnessable” security beast: the value chain. Many hypothesize that IT solutions with security “built in” are as rare as the mythological unicorn. I propose quashing such a hypothesis and making security “built in” a reality. And…the very place to do it []

Source:: Cisco Security Notice

By Edna Conway Security threats are varied and often unpredictable. We are faced with an expanding attack surface. Adversaries abound, spanning organized crime, nation-states and malicious insiders. It is against this backdrop that the IT solutions lifecycle may appear to be an “unharnessable” security beast: the value chain. Many hypothesize that IT solutions with security “built in” are as rare as the mythological unicorn. I propose quashing such a hypothesis and making security “built in” a reality. And…the very place to do it []

Source:: Cisco Security Notice