Logo
16.01.2019

Nachrichten

BLOG: Beurteilen Sie ein Buch nicht nach seinem Umschlag! Was sind Insider-Bedrohungen? Warum sollten Sie diese ernst nehmen?

Im vergangenen Jahr kam es zu einer Flut von Sicherheitsverletzungen, die alle große Beachtung fanden und eines gemeinsam hatten – ein Mitarbeiter oder Insider verursachte diese mutwillig. Für Sicherheitsexperten ist es einfach, sich auf die externen Bedrohungen zu ...

lesen
Logo
11.01.2019

Nachrichten

BLOG: Die wichtigsten Fakten zur Jagd nach Cyberbedrohungen

Kürzlich haben wir unsere aktuellen Umfrageergebnisse im Bericht „2018 State of Threat Detection“ veröffentlicht und einige interessante Entwicklungen im Bereich der Jagd nach Cyberbedrohungen festgestellt. Aber was genau ist die Jagd nach Bedrohungen? Wer macht das? ...

lesen
Logo
11.01.2019

Nachrichten

Network DLP Buyer's Guide (Download Link)

Mapping out data security features across network, endpoint, cloud platforms, SaaS apps, operating systems, plus web, email and cloud gateways is a modern-day DLP challenge. No one vendor is the best-of-breed answer for DLP within hybrid environments as a single solution silo

lesen
Logo
10.01.2019

Nachrichten

See More Across Your Environment: Align Visibility for Post-Breach Detection and Response (Whitepaper)

Threat actors are constantly adapting their tactics, techniques and procedures to evade preventive defenses and as a result, consideration of detection and response capabilities has never been more vital. In this paper we discuss why organizations can no longer rely on a ...

lesen
Logo
10.01.2019

Nachrichten

Fidelis Network® DLP Demo (Recorded Live Demonstration)

Network DLP is a key feature within a larger security stack for detection and response. See how you can gain visibility into content over all ports and protocols to detect threats and prevent data loss. What this demo video, find out how Fidelis Network® can: See ...

lesen
Logo
09.01.2019

Nachrichten

Threat Detection to Resolution: A Guide to Closing the Loop (White Paper Download)

Combating modern intrusions requires an intelligence-driven defense and technology that equips analysts with the context, visibility and speed required to confidently identify, investigate, and stop advanced attacks. This guide primarily focuses on how to bolster threat ...

lesen
Logo
08.01.2019

Nachrichten

Welche Rolle spielt maschinelles Lernen (Machine learning) im „Threat Hunting“ Prozess?

Roland Messmer, Director Sales Central Europe von Fidelis Cybersecurity, erörtert bewährte Vorgehensweisen bei „Threat Hunting“, einschließlich der Rolle des maschinellen Lernens beim Schutz von Unternehmen. In einem aktuellen Bericht von Fidelis Cybersecurity werden Fallbeisp

lesen
Logo
07.01.2019

Nachrichten

On Demand Webinar: SANS 2018 Incident Response Survey Results - Part 2

Watch here: https://fidelissecurity.wistia.com/medias/on76bha8q9?wvideo=on76bha8q9&mkt_tok=eyJpIjoiWWpRM1pUYzNaV0ZoWkRGbSIsInQiOiJYemJ3SGs3VWV5VTI2SUMrWG93aFZtWU9Td3pWaktXa1U4VTVuTTFVRm5QMUxkcmRpUnE2bVZCRDlJVTVJWXFTSkc0dFFNSEMrWVNISlE3U00xUEt3RkF3S1BJcUxEbHFEWDBraVRtMUNDbnVkTz

lesen
Logo
07.01.2019

Nachrichten

Capture the Flag with Deception Defenses (Whitepaper)

A new and deadly generation of remotely controlled targeted corporate network attacks is challenging core network security assumptions, making prevention centric strategies obsolete. While network security teams are starting to shift their focus from perimeter defense to post

lesen
Logo
04.01.2019

Nachrichten

On Demand Webinar: SANS 2018 Incident Response Survey Results - Part 1

Click here to view Part 1: How Are You Responding to Threats? SANS 2018 Incident Response Survey Results

lesen
Logo
04.01.2019

Nachrichten

On Demand Webinar: SANS 2018 Incident Response Survey Results

Incident responders are catching and remediating threats faster than ever, according to past SANS surveys. Much of their success can be attributed to improving technologies, such as threat intelligence 73 percent of respondents to last year's survey said they were using threat

lesen
Logo
21.12.2018

Nachrichten

Blog: Security Predictions from the Magic 8 Ball (English)

3 Predictions from the Magic 8 Ball for 2019

lesen
Logo
19.12.2018

Nachrichten

New Head of Threat Research for Fidelis Cybersecurity Drives Threat Hunting with Vast Intel Experience

Danny Pickens, former military intelligence and counterterrorism veteran will drive threat intelligence Bethesda, MD – December 12, 2018 –Fidelis Cybersecurity (Fidelis), a leading provider of threat detection, threat hunting and response solutions, today announced the appoint

lesen
Logo
05.12.2018

Nachrichten

Blog: Die DNA für Detection & Response (Deutsch)

Der Weg von der Prävention zur Erkennung und Abwehr von Attacken erfordert einen neuen Blickwinkel auf die DNA von Bedrohungen, um erfolgreich agieren zu können. Die jahrzehntelang eingesetzten, vorbeugenden Abwehrmaßnahmen haben Konzepte etabliert wie Sandboxing, Transparenz ...

lesen
Logo
30.11.2018

Nachrichten

What's Hiding Within Your Metadata? How to Decode Your Network's Deepest and Darkest Secrets (Whitepaper)

This paper explains what rich, historical metadata is, how you get it and how the insights and analytics it enables can materially transform the way you detect and investigate critical security threats. Drawing from our firsthand experience, we provide case studies on how ...

lesen
Logo
30.11.2018

Nachrichten

MDR vs MSSP: What to think about when choosing an outsourcing model

With cybercrime rates and nation-state threats ever increasing, security operation centres (SOCs) often do not have the staff or skills in-house to effectively monitor and respond to threats. This is pertinent in the UK, where the chasm between employer demand and a ready supp

lesen
Logo
30.11.2018

Nachrichten

Don’t Let the Grinch Steal Christmas: A Timeline of Holiday Season Magecart Activity (Blog)

The retail, travel and hospitality industries face difficult security challenges year-round, but November through to the end of the year is the time that keeps the security professionals in these industries especially busy. The holiday shopping season is a time for financiall

lesen
Logo
27.11.2018

Nachrichten

SANS 2018 Incident Response Survey Results (Recorded Webninar)

Summary Incident responders are catching and remediating threats faster than ever, according to past SANS surveys. Much of their success can be attributed to improving technologies, such as threat intelligence—73 percent of respondents to last year's survey said they were

lesen
Logo
23.11.2018

Nachrichten

BLOG: Deep Packet Inspection – Ist es ausreichend? (Deutsch)

Sicherheitsanalysten sind oftmals der Meinung, dass Deep Packet Inspection (DPI) eine grundlegende Voraussetzung für die Erkennung von Malware und die Nachverfolgung von Datenverlusten im Netzwerk ist. Diese bewährte Methode gibt es bereits seit den frühen 2000er Jahren und ...

lesen
Logo
22.11.2018

Nachrichten

Automate Response with Fidelis Elevate™ (Video)

Klick on the Link to watch our Video: https://www.fidelissecurity.com/resources/video/automate-response-fidelis-elevate%E2%84%A2

lesen
Logo
21.11.2018

Nachrichten

The CISO's changing domain: from prevention to threat hunting (SC Media Report)

The CISO’s changing domain: From Prevention to Threat Hunting The continuing stream of high-profile data breaches, such as those of Ticketmaster and British Airways, is making it increasingly clear that traditional means of defence ...

lesen
Logo
20.11.2018

Nachrichten

Fidelis Deception™ Explained (Video)

What is Fidelis Deception and how can it help you improve your post-breach detection capabilities? Watch this short video to find out how this automated deception technology provides a low-risk, low-friction alarm system that helps you dramatically reduce the length of time at

lesen
Logo
09.11.2018

Nachrichten

On Demand Webinar: You Can't Detect What You Can't See: Illuminating the Entire Kill Chain

Summary With technology advances and threats seemingly coming from every direction, security environments have become more complex. Sensitive data is no longer locked within the corporate walls as the boundaries have expanded from the network to endpoints to the cloud. ...

lesen
Logo
07.11.2018

Nachrichten

MDR vs MSSP: What to think about when choosing an outsourcing model

Business and government IT workloads are rapidly transitioning from premises-based data centers to cloud service providers (CSPs). But challenges arise when CSP compute instances are ....

lesen
Logo
06.11.2018

Nachrichten

BLOG: Extending Your Network Security to AWS

Read full Blog here: https://www.fidelissecurity.com/threatgeek/cyberdefense/aws-security Business and government IT workloads are rapidly transitioning from premises-based data centers to cloud service providers (CSPs). But challenges arise when CSP compute instances are una

lesen
Logo
05.11.2018

Nachrichten

Fidelis Cybersecurity and Netgate Announce Integrated Network Security Solution for AWS Hosted Applications

Fidelis Network Sensors coupled with Netgate TNSR provides easy-to-deploy cloud mirror port for traffic visibility, threat detection, and data loss and theft detection November 1, 2018 (AUSTIN, TX and BETHESDA, MD) – Fidelis Cybersecurity and Netgate today announced an ...

lesen
Logo
01.11.2018

Nachrichten

Fewer than a fifth of organizations have a dedicated threat hunting team (Tim Roddy)

Threat hunting likely ranks second after artificial intelligence as a leading cybersecurity marketing buzzword and top airport advertising theme. Why not hunt for threats when dwell time between attack infections and detections can take months? Hiring threat hunters could ...

lesen
Logo
30.10.2018

Nachrichten

How confident are you in your organization's threat detection capabilities?

How confident are you in your organization's threat detection capabilities? We asked over 580 #cybersecurity professionals the same question. Check out the 2018 State of Threat Detection Report to find out what they said: Read more here

lesen
Logo
30.10.2018

Nachrichten

BLOG: Strategien für Deception-Techniken: Eindämmung versus Erkennung von Angriffen

Die Diskussionen zu Deception führen oft zum Thema Honeypots und dies kann für Verwirrung sorgen. Sprechen wir dann noch über weitere Begriffe, die im Zusammenhang mit Täuschungstechnologien oftmals genannt werden – wie Breadcrumbs, Decoys (Köder für Angreifer), Fallen, ...

lesen
Logo
25.10.2018

Nachrichten

It's Time to Threat Hunt - THE STATE OF THREAT DETECTION REPORT 2018

Is your organization threat hunting? Nearly half of the professionals who participated in The State of Threat Detection study noted that they didn't have the time to #threathunt, and a third cited lack of skills. ...

lesen
Logo
22.10.2018

Nachrichten

BLOG: Von Honeypots zu autom. Deception & Defense

Eine sehr häufige Antwort, wenn es um Deception (Täuschung) geht, ist ein Verweis auf Honeypots im Bereich der Cyber-Sicherheit. Ja, moderne Deception-Lösungen werden von Honeypots abgeleitet und die Weiterentwicklung dieser effektiven Verteidigung steht im ... Read more:

lesen
Logo
19.10.2018

Nachrichten

When cybersecurity capabilities are paid for without any results... (Article)

Government agencies, like too many large enterprises, have built out increasingly complex and overlapping technology stacks, and this problem is especially prominent in cybersecurity technology. Driven by contracting limitations, lack of manpower and limited training, ...

lesen
Logo
16.10.2018

Nachrichten

SC Media Fidelis Deception™ (Review)

Cyber attacks are not single events, they're processes. Once an attacker has managed to access a network or endpoint they don't know where they are, and they gather intel by searching assets for valuable information and clues about where the desired data or location. Read more:

lesen
Logo
16.10.2018

Nachrichten

threatgeek - BLOG: It's Time to Seek: 3 Ways to Take Detection to a New Level

The year so far has been a busy one – crypto mining is happening more frequently, the volume of cyberattacks is growing and cybercrime continues to be extremely well-funded. To top it off, with the number of devices being used, cybersecurity has never been more complicated. ...

lesen
Logo
11.10.2018

Nachrichten

It's Time to Seek: 3 Ways to Take Detection to a New Level

The year so far has been a busy one – crypto mining ishappening more frequently, thevolume ofcyberattacks is growing and cybercrime continues to be extremely well-funded. To top it off, with the number of devices being used, cybersecurity has never been more complicated. ...

lesen
Logo
10.10.2018

Nachrichten

Fidelis Cybersecurity Announces Support for Microsoft Azure’s Virtual Network TAP

Bethesda, MD – October 10, 2018 – Fidelis Cybersecurity announces support for Microsoft Azure’s high-speed virtual network terminal access point (TAP) to enable continuous mirroring of virtual machine (VM) network traffic, without the use of agents, directly to Fidelis Network ..

lesen
Logo
28.09.2018

Nachrichten

We're Going Native: Introducing the Azure Virtual Network TAP

This week at Microsoft Ignite, Microsoft called cybersecurity the “central challenge of the digital age,” and drew attention to the fact that organizations are spending valuable time and shifting “resources away from their core business mission to defend against, and ...

lesen
Logo
28.09.2018

Nachrichten

threatgeek - BLOG: We're Going Native: Introducing the Azure Network VTAP

Up until now, organizations could only conduct cloud network traffic analysis with the use of agents within VMs. This is changing and here's how. This week at Microsoft Ignite, Microsoft called cybersecurity the “central challenge of the digital age,” and drew attention to ...

lesen
Logo
24.09.2018

Nachrichten

Try Fidelis Network - Start our 15-day Free Trial

Detect Threats Faster Fidelis Network® provides unparalleled network visibility across all ports and protocols, detects threats and prevents data loss. Unlike other solutions Fidelis Network goes beyond inspecting just packets; the technology looks deep into the content ...

lesen
Logo
24.09.2018

Nachrichten

Fidelis Elevate In Action / Live Product Demo (Webinar - Recorded)

See how Fidelis Elevate™ helps organizations shift from a prevention-focused approach to one that prioritizes detection and response. Fidelis Elevate is the only unified security operations platform that automates threat detection and response and prevents data theft. Read more..

lesen