Pretexting: 5 Beispiele für Social Engineering-Taktiken

vadesecurePretexting ist eine Form des Social Engineerings, mit der Opfer manipuliert werden, damit sie vertrauliche Informationen preisgeben. Hacker recherchieren ihre Opfer oft schon vor dem ersten Gespräch. Dies gibt dem Hacker ein Gefühl für das persönliche und berufliche Leben des Opfers und hilft ihm, den richtigen Vorwand zu finden, unter dem er sich dem Opfer nähern kann.

Weiterlesen

The Road to a Next Generation Security Operations Capability

threatquotient logo 400x160Groups like SANSMITREGartnerFrost & SullivanForrester and IDC all discuss the central role that threat intelligence plays in a modern SOC. Understanding who is attacking you and how they are going about it, is a critical capability. But the focus is often on external sources, supported by the idea that the most valuable threat intelligence comes from outside your organization. 

Weiterlesen

The Path to Continuous Authentication: Solving the Best of Breed Problem

okta logo 400 colorFor years the network perimeter has been the foundation for controlling access to digital resources: kill the network, and the user no longer has access. Today’s cloud-first world has changed that, shifting the security perimeter to users and devices—and as companies continue to adopt best of breed solutions that enable their workforce, they need identity providers that can effectively protect their systems.

Weiterlesen

Warum das richtige Maß an Cybersicherheit für die Digitalisierung entscheidend ist

kasperskyCybersicherheit ist eine wesentliche Grundlage für die erfolgreiche Digitalisierung in Gesellschaft, Wirtschaft und Staat. Die Sicherheit von Regierungen, Unternehmen, Hochschulen und Bürgern zu sichern ist eine gemeinschaftliche Aufgabe für alle Akteure. In Zeiten der Corona Pandemie gilt dies mehr denn je. COVID-19 hat nicht nur einen enormen Einfluss auf die Gesundheitssysteme, die Gesellschaft und die wirtschaftliche Entwicklung. Auch die Cyber-Bedrohungslandschaft hat sich drastisch verändert.

Weiterlesen

Easier Security Management Across Segmented Networks

illusive Logo 650Network segmentation—splitting up a network into smaller subnetworks—is a common practice, especially in large organizations. The benefits in segmenting networks include heightened network security, including better privilege management across different departments, isolating a successful attack (or other types of network failures) to a local network, and reduced attack surface, as well as better network performance through reduced congestion (fewer hosts in each subnetwork). Regulatory compliance can be a motivation as well. Additionally, previous mergers and acquisitions often necessitate that networks remain separate.  

Weiterlesen

DEBUNKING THE MYTHS ON NDR SELECTION CRITERIA

ExtraHop logo 400x160kHere at ExtraHop we have built our products around the core idea of helping our customers Rise Above the Noise. We do this within our products by combining industry leading data ingestion capabilities with our cutting edge protocol parsing and machine learning engines. The result is high fidelity data and accurate detection for those who need it, when they need it most.

Weiterlesen

Phishes Found in Proofpoint-Protected Environments – Week Ending May 31, 2020

cofense logo100% of the phish seen by the Cofense Phishing Defense Center (PDC) have been found in environments protected by Secure Email Gateways (SEGs), were reported by humans, and automatically analyzed and dispositioned by Cofense Triage. Cofense solutions enable organizations to identify, analyze, and quarantine email threats in minutes. 

Weiterlesen

Cybersecurity Challenges in the Wake of COVID-19

accessdata logoAs the coronavirus continues to spread, the possibility for more disruption of day-to-day operations grows. For those who have migrated their workforce away from the office, working remotely without compromising security is critical and challenging. According to Global Workplace Analytics, 50% of U.S. workers are now working from home full time but cybersecurity concerns are confronting organizations, 48% of which according to Slack, are struggling to enable a Work Remote Solution.

Weiterlesen

ectacom HQ München

ectacom GmbH
+49 8102 8952-0
Friedrich-Bergius-Str. 12
D-85662 Hohenbrunn

ectacom Wien

ectacom GmbH
Am Europlatz 2
A-1120 Wien

ectacom Poland

ectacom GmbH - Branch in Warsaw
+48 501 295 580
Diese E-Mail-Adresse ist vor Spambots geschützt! Zur Anzeige muss JavaScript eingeschaltet sein!