Logo
18.03.2019

Nachrichten

Fidelis Cybersecurity Delivers Major Innovations to Provide Full Visibility of the Cyber Terrain to Detect, Hunt and Respond to Advanced Threats

Fidelis Elevate is the first platform of its kind to enable organizations to calculate their vulnerable attack surface and respond accordingly to build a robust defense March 5, 2019 (BETHESDA, MD) – Fidelis Cybersecurity, a leading provider of threat detection, threat hunting

lesen
Logo
11.03.2019

Nachrichten

BLOG: Setzen Sie auf eine umgebungsorientierte Verteidigungsstrategie (Deutsch)

Nicht wer, nicht wie… sondern wo Weltweit werden Unternehmen von finanzstarken Hacker-Gruppierungen angegriffen, denen es gelingt, die herkömmlichen Abwehrmaßnahmen zu durchbrechen. Diese Angriffe führen uns vor Augen, dass wir uns nicht mehr ausschließlich auf präventive ...

lesen
Logo
08.03.2019

Nachrichten

The winner of the 2019 SC Awards Honored in the U.S. - Fidelis DECEPTION

Winner Fidelis Cybersecurity for Fidelis Deception Think of it like the good guy’s version of phishing. An organization adorns its network with a series of alluring decoy targets. Unwanted intruders who pursue these fake assets play right into the so-called victim’s hands. ...

lesen
Logo
06.03.2019

Nachrichten

BLOG: Fidelis Announces First of its Kind Platform Enhancements

Today we are thrilled to announce an upcoming Fidelis Elevate release which will see the platform become the first of its kind to enable organizations to not only calculate their vulnerable attack surface, but also respond effectively to these insights to build a robust ...

lesen
Logo
04.03.2019

Nachrichten

Fidelis Recognized on CRN’s 2019 Security 100 List

We’re excited to announce that today CRN®, a brand of The Channel Company, has named Fidelis Cybersecurity on its annual Security 100 list, for the third year running. The Security 100 list recognizes the coolest security vendors in each of five categories: Endpoint Security...

lesen
Logo
04.03.2019

Nachrichten

Fidelis Cybersecurity Delivers Major Innovations to Provide Full Visibility of the Cyber Terrain to Detect, Hunt and Respond to Advanced Threats

Fidelis Elevate is the first platform of its kind to enable organizations to calculate their vulnerable attack surface and respond accordingly to build a robust defense March 5, 2019 (BETHESDA, MD) – Fidelis Cybersecurity, a leading provider of threat detection, threat hunting

lesen
Logo
25.02.2019

Nachrichten

BLOG: Die Jagd nach ATT&CKen und die Rahmenbedingungen für den Erfolg (Deutsch)

Die Jagd nach Cyberbedrohungen. MITRE ATT&CK. Diese Begriffe wurden in letzter Zeit stark strapaziert, miteinander in Verbindung gebracht und der Welt der Cybersicherheit in großem Stil aufgezwungen. Es gibt unzählige Blogbeiträge zu jedem dieser Begriffe oder beiden ...

lesen
Logo
15.02.2019

Nachrichten

BLOG: Insider-Bedrohungen: Sind Sie auf „die faulen Äpfel“ in Ihrem Unternehmen ausreichend vorbereitet? (Deutsch)

In einem meiner letzten Blogbeiträge habe ich erklärt, was Insider-Bedrohungen sind und warum Unternehmen das Risiko, das sie darstellen, ernst nehmen sollten. In dieser Woche möchte ich Ihnen erläutern, wo Ihr Unternehmen steht, wie Sie das Problem der Insider-Bedrohungen ...

lesen
Logo
14.02.2019

Nachrichten

Fidelis Cybersecurity Hires Chief Scientist to Spearhead Innovation and Enhance Detection Efficacy

Press Release With strong government security roots and doctorate degrees in physics and mathematics, Dr. Abdul Rahman will drive innovation and mission focused detection capabilities within the Fidelis Elevate platform BETHESDA, Md.- Fidelis Cybersecurity (Fidelis), ...

lesen
Logo
08.02.2019

Artikel

Bedrohungserkennung nach einem Cyberangriff

Exploits und Angriffsmethoden werden ständig weiterentwickelt, zum Beispiel für E-Mails, Drive-by-Downloads und Sicherheitslücken in Anwendungen sowie BYOD-Geräte und Smartphones, die mit WLAN oder sozialen Netzwerken verbunden sind. Das bringt für die Netzwerksicherheit immer ne...

lesen
Logo
07.02.2019

Artikel

Bedrohungserkennung nach einem Cyberangriff

Exploits und Angriffsmethoden werden ständig weiterentwickelt, zum Beispiel für E-Mails, Drive-by-Downloads und Sicherheitslücken in Anwendungen sowie BYOD-Geräte und Smartphones, die mit WLAN oder sozialen Netzwerken verbunden sind. Das bringt für die Netzwerksicherheit immer ne...

lesen
Logo
05.02.2019

Nachrichten

BLOG: Solving Cyber Crimes as Agent A

Spoiler alert! In this blog, I’ll be outlining our approach to solving a cyber challenge that has been posted by the Israeli Secret Service (Shabak). This is not a traditional hacking challenge, but rather focuses on software engineering and data science. The Israel Secret Ser

lesen
Logo
18.01.2019

Nachrichten

Vorstellung Lösungspartner: QGroup GmbH (Frankfurt)

Ihr Partner und Kompetenzzentrum für Verfügbarkeit und IT-Sicherheit Die QGroup wurde 1993 gegründet und fungiert seit dem Jahr 2000 als Hersteller von (Hoch-) Sicherheitsprodukten. Diese unter dem Namen QTrust vertriebenen und am Markt etablierten Produkte haben ihre Kunden

lesen
Logo
17.01.2019

Nachrichten

Technology Partners of Fidelis Cybersecurity (Overview)

Fidelis recognizes that there is no silver bullet when it comes to ensuring your cybersecurity. That’s why we actively partner and integrate with other leading technologies to eliminate blind spots within your security stack and to enhance your ability to quickly and effectiv

lesen
Logo
16.01.2019

Nachrichten

BLOG: Beurteilen Sie ein Buch nicht nach seinem Umschlag! Was sind Insider-Bedrohungen? Warum sollten Sie diese ernst nehmen?

Im vergangenen Jahr kam es zu einer Flut von Sicherheitsverletzungen, die alle große Beachtung fanden und eines gemeinsam hatten – ein Mitarbeiter oder Insider verursachte diese mutwillig. Für Sicherheitsexperten ist es einfach, sich auf die externen Bedrohungen zu ...

lesen
Logo
11.01.2019

Nachrichten

Network DLP Buyer's Guide (Download Link)

Mapping out data security features across network, endpoint, cloud platforms, SaaS apps, operating systems, plus web, email and cloud gateways is a modern-day DLP challenge. No one vendor is the best-of-breed answer for DLP within hybrid environments as a single solution silo

lesen
Logo
11.01.2019

Nachrichten

BLOG: Die wichtigsten Fakten zur Jagd nach Cyberbedrohungen

Kürzlich haben wir unsere aktuellen Umfrageergebnisse im Bericht „2018 State of Threat Detection“ veröffentlicht und einige interessante Entwicklungen im Bereich der Jagd nach Cyberbedrohungen festgestellt. Aber was genau ist die Jagd nach Bedrohungen? Wer macht das? ...

lesen
Logo
10.01.2019

Nachrichten

See More Across Your Environment: Align Visibility for Post-Breach Detection and Response (Whitepaper)

Threat actors are constantly adapting their tactics, techniques and procedures to evade preventive defenses and as a result, consideration of detection and response capabilities has never been more vital. In this paper we discuss why organizations can no longer rely on a ...

lesen
Logo
10.01.2019

Nachrichten

Fidelis Network® DLP Demo (Recorded Live Demonstration)

Network DLP is a key feature within a larger security stack for detection and response. See how you can gain visibility into content over all ports and protocols to detect threats and prevent data loss. What this demo video, find out how Fidelis Network® can: See ...

lesen
Logo
09.01.2019

Nachrichten

Threat Detection to Resolution: A Guide to Closing the Loop (White Paper Download)

Combating modern intrusions requires an intelligence-driven defense and technology that equips analysts with the context, visibility and speed required to confidently identify, investigate, and stop advanced attacks. This guide primarily focuses on how to bolster threat ...

lesen
Logo
08.01.2019

Nachrichten

Welche Rolle spielt maschinelles Lernen (Machine learning) im „Threat Hunting“ Prozess?

Roland Messmer, Director Sales Central Europe von Fidelis Cybersecurity, erörtert bewährte Vorgehensweisen bei „Threat Hunting“, einschließlich der Rolle des maschinellen Lernens beim Schutz von Unternehmen. In einem aktuellen Bericht von Fidelis Cybersecurity werden Fallbeisp

lesen
Logo
07.01.2019

Nachrichten

On Demand Webinar: SANS 2018 Incident Response Survey Results - Part 2

Watch here: https://fidelissecurity.wistia.com/medias/on76bha8q9?wvideo=on76bha8q9&mkt_tok=eyJpIjoiWWpRM1pUYzNaV0ZoWkRGbSIsInQiOiJYemJ3SGs3VWV5VTI2SUMrWG93aFZtWU9Td3pWaktXa1U4VTVuTTFVRm5QMUxkcmRpUnE2bVZCRDlJVTVJWXFTSkc0dFFNSEMrWVNISlE3U00xUEt3RkF3S1BJcUxEbHFEWDBraVRtMUNDbnVkTz

lesen
Logo
07.01.2019

Nachrichten

Capture the Flag with Deception Defenses (Whitepaper)

A new and deadly generation of remotely controlled targeted corporate network attacks is challenging core network security assumptions, making prevention centric strategies obsolete. While network security teams are starting to shift their focus from perimeter defense to post

lesen
Logo
04.01.2019

Nachrichten

On Demand Webinar: SANS 2018 Incident Response Survey Results - Part 1

Click here to view Part 1: How Are You Responding to Threats? SANS 2018 Incident Response Survey Results

lesen
Logo
04.01.2019

Nachrichten

On Demand Webinar: SANS 2018 Incident Response Survey Results

Incident responders are catching and remediating threats faster than ever, according to past SANS surveys. Much of their success can be attributed to improving technologies, such as threat intelligence 73 percent of respondents to last year's survey said they were using threat

lesen
Logo
21.12.2018

Nachrichten

Blog: Security Predictions from the Magic 8 Ball (English)

3 Predictions from the Magic 8 Ball for 2019

lesen
Logo
19.12.2018

Nachrichten

New Head of Threat Research for Fidelis Cybersecurity Drives Threat Hunting with Vast Intel Experience

Danny Pickens, former military intelligence and counterterrorism veteran will drive threat intelligence Bethesda, MD – December 12, 2018 –Fidelis Cybersecurity (Fidelis), a leading provider of threat detection, threat hunting and response solutions, today announced the appoint

lesen
Logo
05.12.2018

Nachrichten

Blog: Die DNA für Detection & Response (Deutsch)

Der Weg von der Prävention zur Erkennung und Abwehr von Attacken erfordert einen neuen Blickwinkel auf die DNA von Bedrohungen, um erfolgreich agieren zu können. Die jahrzehntelang eingesetzten, vorbeugenden Abwehrmaßnahmen haben Konzepte etabliert wie Sandboxing, Transparenz ...

lesen
Logo
30.11.2018

Nachrichten

What's Hiding Within Your Metadata? How to Decode Your Network's Deepest and Darkest Secrets (Whitepaper)

This paper explains what rich, historical metadata is, how you get it and how the insights and analytics it enables can materially transform the way you detect and investigate critical security threats. Drawing from our firsthand experience, we provide case studies on how ...

lesen
Logo
30.11.2018

Nachrichten

MDR vs MSSP: What to think about when choosing an outsourcing model

With cybercrime rates and nation-state threats ever increasing, security operation centres (SOCs) often do not have the staff or skills in-house to effectively monitor and respond to threats. This is pertinent in the UK, where the chasm between employer demand and a ready supp

lesen
Logo
30.11.2018

Nachrichten

Don’t Let the Grinch Steal Christmas: A Timeline of Holiday Season Magecart Activity (Blog)

The retail, travel and hospitality industries face difficult security challenges year-round, but November through to the end of the year is the time that keeps the security professionals in these industries especially busy. The holiday shopping season is a time for financiall

lesen
Logo
27.11.2018

Nachrichten

SANS 2018 Incident Response Survey Results (Recorded Webninar)

Summary Incident responders are catching and remediating threats faster than ever, according to past SANS surveys. Much of their success can be attributed to improving technologies, such as threat intelligence—73 percent of respondents to last year's survey said they were

lesen
Logo
23.11.2018

Nachrichten

BLOG: Deep Packet Inspection – Ist es ausreichend? (Deutsch)

Sicherheitsanalysten sind oftmals der Meinung, dass Deep Packet Inspection (DPI) eine grundlegende Voraussetzung für die Erkennung von Malware und die Nachverfolgung von Datenverlusten im Netzwerk ist. Diese bewährte Methode gibt es bereits seit den frühen 2000er Jahren und ...

lesen
Logo
22.11.2018

Nachrichten

Automate Response with Fidelis Elevate™ (Video)

Klick on the Link to watch our Video: https://www.fidelissecurity.com/resources/video/automate-response-fidelis-elevate%E2%84%A2

lesen
Logo
21.11.2018

Nachrichten

The CISO's changing domain: from prevention to threat hunting (SC Media Report)

The CISO’s changing domain: From Prevention to Threat Hunting The continuing stream of high-profile data breaches, such as those of Ticketmaster and British Airways, is making it increasingly clear that traditional means of defence ...

lesen
Logo
20.11.2018

Nachrichten

Fidelis Deception™ Explained (Video)

What is Fidelis Deception and how can it help you improve your post-breach detection capabilities? Watch this short video to find out how this automated deception technology provides a low-risk, low-friction alarm system that helps you dramatically reduce the length of time at

lesen
Logo
09.11.2018

Nachrichten

On Demand Webinar: You Can't Detect What You Can't See: Illuminating the Entire Kill Chain

Summary With technology advances and threats seemingly coming from every direction, security environments have become more complex. Sensitive data is no longer locked within the corporate walls as the boundaries have expanded from the network to endpoints to the cloud. ...

lesen
Logo
07.11.2018

Nachrichten

MDR vs MSSP: What to think about when choosing an outsourcing model

Business and government IT workloads are rapidly transitioning from premises-based data centers to cloud service providers (CSPs). But challenges arise when CSP compute instances are ....

lesen
Logo
06.11.2018

Nachrichten

BLOG: Extending Your Network Security to AWS

Read full Blog here: https://www.fidelissecurity.com/threatgeek/cyberdefense/aws-security Business and government IT workloads are rapidly transitioning from premises-based data centers to cloud service providers (CSPs). But challenges arise when CSP compute instances are una

lesen
Logo
05.11.2018

Nachrichten

Fidelis Cybersecurity and Netgate Announce Integrated Network Security Solution for AWS Hosted Applications

Fidelis Network Sensors coupled with Netgate TNSR provides easy-to-deploy cloud mirror port for traffic visibility, threat detection, and data loss and theft detection November 1, 2018 (AUSTIN, TX and BETHESDA, MD) – Fidelis Cybersecurity and Netgate today announced an ...

lesen