Logo
21.01.2019

Nachrichten

BLOG: Insider Threats: Are you prepared for the bad apple?

In last week’s blog I explained what Insider Threats were, and why organizations should be taking the risk that they pose seriously. This week I’ll be explaining how the organization should approach the issue of insider threat and how you can take the first steps to assessing

lesen
Logo
18.01.2019

Nachrichten

Vorstellung Lösungspartner: QGroup GmbH (Frankfurt)

Ihr Partner und Kompetenzzentrum für Verfügbarkeit und IT-Sicherheit Die QGroup wurde 1993 gegründet und fungiert seit dem Jahr 2000 als Hersteller von (Hoch-) Sicherheitsprodukten. Diese unter dem Namen QTrust vertriebenen und am Markt etablierten Produkte haben ihre Kunden

lesen
Logo
17.01.2019

Nachrichten

Technology Partners of Fidelis Cybersecurity (Overview)

Fidelis recognizes that there is no silver bullet when it comes to ensuring your cybersecurity. That’s why we actively partner and integrate with other leading technologies to eliminate blind spots within your security stack and to enhance your ability to quickly and effectiv

lesen
Logo
16.01.2019

Nachrichten

BLOG: Beurteilen Sie ein Buch nicht nach seinem Umschlag! Was sind Insider-Bedrohungen? Warum sollten Sie diese ernst nehmen?

Im vergangenen Jahr kam es zu einer Flut von Sicherheitsverletzungen, die alle große Beachtung fanden und eines gemeinsam hatten – ein Mitarbeiter oder Insider verursachte diese mutwillig. Für Sicherheitsexperten ist es einfach, sich auf die externen Bedrohungen zu ...

lesen
Logo
11.01.2019

Nachrichten

Network DLP Buyer's Guide (Download Link)

Mapping out data security features across network, endpoint, cloud platforms, SaaS apps, operating systems, plus web, email and cloud gateways is a modern-day DLP challenge. No one vendor is the best-of-breed answer for DLP within hybrid environments as a single solution silo

lesen
Logo
11.01.2019

Nachrichten

BLOG: Die wichtigsten Fakten zur Jagd nach Cyberbedrohungen

Kürzlich haben wir unsere aktuellen Umfrageergebnisse im Bericht „2018 State of Threat Detection“ veröffentlicht und einige interessante Entwicklungen im Bereich der Jagd nach Cyberbedrohungen festgestellt. Aber was genau ist die Jagd nach Bedrohungen? Wer macht das? ...

lesen
Logo
10.01.2019

Nachrichten

See More Across Your Environment: Align Visibility for Post-Breach Detection and Response (Whitepaper)

Threat actors are constantly adapting their tactics, techniques and procedures to evade preventive defenses and as a result, consideration of detection and response capabilities has never been more vital. In this paper we discuss why organizations can no longer rely on a ...

lesen
Logo
10.01.2019

Nachrichten

Fidelis Network® DLP Demo (Recorded Live Demonstration)

Network DLP is a key feature within a larger security stack for detection and response. See how you can gain visibility into content over all ports and protocols to detect threats and prevent data loss. What this demo video, find out how Fidelis Network® can: See ...

lesen
Logo
09.01.2019

Stellenanzeigen

Sales Engineer - DACH (Muenchen or Germany)

Overview At Fidelis Cybersecurity, our mission is to protect the world’s most sensitive data by providing organizations with a robust, comprehensive portfolio of products, services, and expertise to combat today’s sophisticated and advanced security threats while preventing...

lesen
Logo
09.01.2019

Nachrichten

Threat Detection to Resolution: A Guide to Closing the Loop (White Paper Download)

Combating modern intrusions requires an intelligence-driven defense and technology that equips analysts with the context, visibility and speed required to confidently identify, investigate, and stop advanced attacks. This guide primarily focuses on how to bolster threat ...

lesen
Logo
09.01.2019

Veranstaltungen

SANS: Game Changing Defensive Strategies for 2019 (Webinar English)

30.01.2019 von 17:00 Uhr - 18:00 Uhr

Veranstaltungsort: https://www.sans.org/webcasts/109990

Its the start of a new year and amidst the countless predictions flooding the internet, one things for certain 2019 is shaping up to be the year of cloud adoption. Analysts are expecting that enterprise adoption of cloud will ramp up significantly, but with this migration and

lesen
Logo
08.01.2019

Nachrichten

Welche Rolle spielt maschinelles Lernen (Machine learning) im „Threat Hunting“ Prozess?

Roland Messmer, Director Sales Central Europe von Fidelis Cybersecurity, erörtert bewährte Vorgehensweisen bei „Threat Hunting“, einschließlich der Rolle des maschinellen Lernens beim Schutz von Unternehmen. In einem aktuellen Bericht von Fidelis Cybersecurity werden Fallbeisp

lesen
Logo
07.01.2019

Nachrichten

On Demand Webinar: SANS 2018 Incident Response Survey Results - Part 2

Watch here: https://fidelissecurity.wistia.com/medias/on76bha8q9?wvideo=on76bha8q9&mkt_tok=eyJpIjoiWWpRM1pUYzNaV0ZoWkRGbSIsInQiOiJYemJ3SGs3VWV5VTI2SUMrWG93aFZtWU9Td3pWaktXa1U4VTVuTTFVRm5QMUxkcmRpUnE2bVZCRDlJVTVJWXFTSkc0dFFNSEMrWVNISlE3U00xUEt3RkF3S1BJcUxEbHFEWDBraVRtMUNDbnVkTz

lesen
Logo
07.01.2019

Nachrichten

Capture the Flag with Deception Defenses (Whitepaper)

A new and deadly generation of remotely controlled targeted corporate network attacks is challenging core network security assumptions, making prevention centric strategies obsolete. While network security teams are starting to shift their focus from perimeter defense to post

lesen
Logo
07.01.2019

Veranstaltungen

Part 1: Identifying and Responding to Insider Threats with Fidelis EDR Technology (Part 1)

17.01.2019 von 17:00 Uhr - 18:00 Uhr

Veranstaltungsort: https://www.fidelissecurity.com/resources/webinar/identify-insider-threats

Wissen Sie Bescheid, wenn eine Insider-Bedrohung ihre sensiblen Daten gefährdet? Falls die Antwort nein lautet, sollten Sie an der kommenden Live-Demo teilnehmen. Hier anmelden:

lesen
Logo
04.01.2019

Nachrichten

On Demand Webinar: SANS 2018 Incident Response Survey Results - Part 1

Click here to view Part 1: How Are You Responding to Threats? SANS 2018 Incident Response Survey Results

lesen
Logo
04.01.2019

Nachrichten

On Demand Webinar: SANS 2018 Incident Response Survey Results

Incident responders are catching and remediating threats faster than ever, according to past SANS surveys. Much of their success can be attributed to improving technologies, such as threat intelligence 73 percent of respondents to last year's survey said they were using threat

lesen
Logo
21.12.2018

Nachrichten

Blog: Security Predictions from the Magic 8 Ball (English)

3 Predictions from the Magic 8 Ball for 2019

lesen
Logo
20.12.2018

Veranstaltungen

Breakfast Briefing UK: 4 Keys to Automating Threat Detection, Threat Hunting and Response

19.03.2019 von 09:00 Uhr - 12:00 Uhr

Veranstaltungsort: UK - Duck & Waffle - London

Summary Tuesday, March 19, 2019 - 8:30am to 10:00am GMT The techniques, tactics and procedures that adversaries use to evade preventive defences are continuously evolving. Cyber-attacks are becoming expected and ultimately, even the most well-prepared organisations are falling

lesen
Logo
19.12.2018

Nachrichten

New Head of Threat Research for Fidelis Cybersecurity Drives Threat Hunting with Vast Intel Experience

Danny Pickens, former military intelligence and counterterrorism veteran will drive threat intelligence Bethesda, MD – December 12, 2018 –Fidelis Cybersecurity (Fidelis), a leading provider of threat detection, threat hunting and response solutions, today announced the appoint

lesen
Logo
19.12.2018

Stellenanzeigen

Inside Sales Representative (München)

Fidelis Cybersecurity ist ein weltweit agierendes Unternehmen im Bereich „Security/Threat Defence“ Sie sind lösungsorientiert und haben Spaß daran Menschen weiterzuhelfen? Bei der Fidelis Cybersecurity GmbH suchen wir nach einem Inside Sales Representative (m/w/d) für den Bere

lesen
Logo
18.12.2018

Veranstaltungen

Event Information: Fidelis Endpoint 9.2 Technical Overview (Webex)

20.12.2018 von 16:00 Uhr - 17:00 Uhr

Veranstaltungsort: https://fidelissecurity.webex.com/fidelissecurity/onstage/g.php?MTID=e87e63d3e94473889a89c85a51e387c77

Topic: Fidelis Endpoint 9.2 Technical Overview Host: Kim Ayers

lesen
Logo
12.12.2018

Link

Fidelis: Cobalt Group ThreadKit Update - Download report

Fidelis Threat Research analysts have discovered a new version of ThreadKit, malware notorious for its use by the cybercrime organization known as Cobalt Group. This report will provide analysis of a campaign, seen October 30th, utilizing the Cobalt Group malware frameworks....

Logo
05.12.2018

Nachrichten

Blog: Die DNA für Detection & Response (Deutsch)

Der Weg von der Prävention zur Erkennung und Abwehr von Attacken erfordert einen neuen Blickwinkel auf die DNA von Bedrohungen, um erfolgreich agieren zu können. Die jahrzehntelang eingesetzten, vorbeugenden Abwehrmaßnahmen haben Konzepte etabliert wie Sandboxing, Transparenz ...

lesen
Logo
04.12.2018

PDF

Nutzen und Grenzen einer NGFW - Reicht aber nicht!

NGFWs (Next Generation Firewalls) ersetzen zunehmen alte legacy Firewalls. Wie UTM (Unified Threat Management) Firewalls konsolidieren sie unterschiedliche Sicherheitsfunktionalitäten auf einer Plattform und erlauben damit ein einfacheres und konsistenteres Management des ...

Logo
30.11.2018

Nachrichten

What's Hiding Within Your Metadata? How to Decode Your Network's Deepest and Darkest Secrets (Whitepaper)

This paper explains what rich, historical metadata is, how you get it and how the insights and analytics it enables can materially transform the way you detect and investigate critical security threats. Drawing from our firsthand experience, we provide case studies on how ...

lesen
Logo
30.11.2018

Nachrichten

MDR vs MSSP: What to think about when choosing an outsourcing model

With cybercrime rates and nation-state threats ever increasing, security operation centres (SOCs) often do not have the staff or skills in-house to effectively monitor and respond to threats. This is pertinent in the UK, where the chasm between employer demand and a ready supp

lesen
Logo
30.11.2018

Nachrichten

Don’t Let the Grinch Steal Christmas: A Timeline of Holiday Season Magecart Activity (Blog)

The retail, travel and hospitality industries face difficult security challenges year-round, but November through to the end of the year is the time that keeps the security professionals in these industries especially busy. The holiday shopping season is a time for financiall

lesen
Logo
27.11.2018

Link

It's Awfully Noisy Out There: Results of the 2018 SANS IR Survey (Report Download)

The past year has seen data breaches impact millions of citizens from both political and financial perspectives. Combined with enforcement of privacy rules and regulations, incident responders have been dealing with an incredible amount of noise. This report provides ...

Logo
27.11.2018

Nachrichten

SANS 2018 Incident Response Survey Results (Recorded Webninar)

Summary Incident responders are catching and remediating threats faster than ever, according to past SANS surveys. Much of their success can be attributed to improving technologies, such as threat intelligence—73 percent of respondents to last year's survey said they were

lesen
Logo
27.11.2018

Link

Fidelis Network® Appliance Specifications

Learn about the different options for Fidelis Network and Collector for Revision I generation hardware.

Logo
23.11.2018

Nachrichten

BLOG: Deep Packet Inspection – Ist es ausreichend? (Deutsch)

Sicherheitsanalysten sind oftmals der Meinung, dass Deep Packet Inspection (DPI) eine grundlegende Voraussetzung für die Erkennung von Malware und die Nachverfolgung von Datenverlusten im Netzwerk ist. Diese bewährte Methode gibt es bereits seit den frühen 2000er Jahren und ...

lesen
Logo
22.11.2018

Nachrichten

Automate Response with Fidelis Elevate™ (Video)

Klick on the Link to watch our Video: https://www.fidelissecurity.com/resources/video/automate-response-fidelis-elevate%E2%84%A2

lesen
Logo
21.11.2018

Nachrichten

The CISO's changing domain: from prevention to threat hunting (SC Media Report)

The CISO’s changing domain: From Prevention to Threat Hunting The continuing stream of high-profile data breaches, such as those of Ticketmaster and British Airways, is making it increasingly clear that traditional means of defence ...

lesen
Logo
20.11.2018

Nachrichten

Fidelis Deception™ Explained (Video)

What is Fidelis Deception and how can it help you improve your post-breach detection capabilities? Watch this short video to find out how this automated deception technology provides a low-risk, low-friction alarm system that helps you dramatically reduce the length of time at

lesen
Logo
09.11.2018

Nachrichten

On Demand Webinar: You Can't Detect What You Can't See: Illuminating the Entire Kill Chain

Summary With technology advances and threats seemingly coming from every direction, security environments have become more complex. Sensitive data is no longer locked within the corporate walls as the boundaries have expanded from the network to endpoints to the cloud. ...

lesen
Logo
07.11.2018

Nachrichten

MDR vs MSSP: What to think about when choosing an outsourcing model

Business and government IT workloads are rapidly transitioning from premises-based data centers to cloud service providers (CSPs). But challenges arise when CSP compute instances are ....

lesen