Layers of Security

By Ken Daniels Do you remember the movie “Die Hard”? Arguably the best Christmas movie ever. All kidding aside, this movie has a great correlation into Security best practices.

Source:: Cisco Security Notice

Layers of Security

By Ken Daniels Do you remember the movie “Die Hard”? Arguably the best Christmas movie ever. All kidding aside, this movie has a great correlation into Security best practices.

Source:: Cisco Security Notice

Vulnerability Spotlight: TALOS-2018-0635/0636 – Sophos HitmanPro.Alert memory disclosure and code execution vulnerabilities

By Talos Group Overview Cisco Talos is disclosing two vulnerabilities in Sophos HitmanPro.Alert, a malware detection and protection tool. Both vulnerabilities lie in the input/output control (IOCTL) message handler. One could allow an

Source:: Cisco Security Notice

Vulnerability Spotlight: TALOS-2018-0635/0636 – Sophos HitmanPro.Alert memory disclosure and code execution vulnerabilities

By Talos Group Overview Cisco Talos is disclosing two vulnerabilities in Sophos HitmanPro.Alert, a malware detection and protection tool. Both vulnerabilities lie in the input/output control (IOCTL) message handler. One could allow an

Source:: Cisco Security Notice

Tackling the Growing Threat Landscape of ICS and the IIoT

By Edna Conway It is no secret that the proliferation of connected devices and sensors has introduced new and growing security challenges across every industry and enterprise.

Source:: Cisco Security Notice

Tackling the Growing Threat Landscape of ICS and the IIoT

By Edna Conway It is no secret that the proliferation of connected devices and sensors has introduced new and growing security challenges across every industry and enterprise.

Source:: Cisco Security Notice

Using Threat Intelligence Effectively in Security Automation and Orchestration with DFLabs and Cisco Security

By Jessica Bair When a security incident occurs, it is unlikely that the entire scope and chain of events will be obvious from the outset.

Source:: Cisco Security Notice

Using Threat Intelligence Effectively in Security Automation and Orchestration with DFLabs and Cisco Security

By Jessica Bair When a security incident occurs, it is unlikely that the entire scope and chain of events will be obvious from the outset.

Source:: Cisco Security Notice

War Games: A WOPR of a Security Test (part 1)

By Tim (Wadhwa-)Brown In what was an interesting change to the usual technical and risk/compliance focused consultancy, the Team carried out a War Games exercise – similar to a „Red Team“ engagement.

Source:: Cisco Security Notice

War Games: A WOPR of a Security Test (part 1)

By Tim (Wadhwa-)Brown In what was an interesting change to the usual technical and risk/compliance focused consultancy, the Team carried out a War Games exercise – similar to a „Red Team“ engagement.

Source:: Cisco Security Notice