Remove 2021 Remove Architecture Remove DNS Remove Technology
article thumbnail

Black Hat USA 2021 Network Operations Center

Cisco Security

Cisco Secure returned as a supporting partner of the Black Hat USA 2021 Network Operations Center (NOC) for the 5 th year ; joining conference producer Informa Tech and its other security partners. Threat hunting is a core mission of the Cisco Secure team, while monitoring the DNS activity for potentially malicious activity.

DNS 144
article thumbnail

Security Innovator of the Year | Jeremy Brown, Trinity Cyber

SC Magazine

Jeremy Brown helped Trinity Cyber develop counter maneuvers for a DNS exploit requiring deep parsing of a certain kind of traffic, deploying it to all clients in less than two days. They developed a powerful new approach to intrusion prevention system as-a-service, delivered through a service edge architecture and patent-pending technology.

DNS 70
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Open Source Security: A Big Problem

eSecurity Planet

Amid discussions on the security of open source technologies like eBPF and Hadoop, OpenSSF speakers Jennifer Fernick, SVP and head of global research at NCC Group, and Christopher Robinson, Intel’s director of security communications, outlined the group’s vision to secure open source software “end to end, at massive scale.”

Big data 143
article thumbnail

Rapid7 InsightIDR Review: Features & Benefits

eSecurity Planet

The list of tools and features included with InsightIDR include: User and entity behavior analytics (UEBA) Endpoint detection and response (EDR) Network traffic analysis (NDR) Centralized log management Automated policy capabilities Visual investigation timeline Deception technology File integrity monitoring (FIM). Rapid7 Competitors.

DNS 111
article thumbnail

Five considerations for cloud migration, from the House of Representatives CISO

SC Magazine

A visitor photographs a symbol of a cloud at the Deutsche Telekom stand the day before the CeBIT technology trade fair. Click here for more coverage of the 2021 RSA Conference. Whenever a company establishes a connection to a CSP, it has to consider whether to change its architecture. Sean Gallup/Getty Images).

article thumbnail

A roadmap for developing a secure enterprise cloud operating model

SC Magazine

Just in the last two years, many such simple and avoidable mistakes in securing the application and data hosted in the public cloud have led to massive data and network breaches at large financial and technology firms such as Accenture, Booz Allen Hamilton, Capital One, Facebook, MGM, Microsoft, and Verizon.

article thumbnail

Ready to move to the cloud? Here’s what you need to do when vetting service providers

SC Magazine

Visitors crowd a cloud computing presentation at the CeBIT technology trade fair on March 2, 2011 in Hanover, Germany. And with more people working remotely during the pandemic, there’s been a push to the cloud, which has forced them to rethink their basic networking and security architectures. Sean Gallup/Getty Images).