Hide this notification We use cookies to track statistics on our website. When you visit our website, you agree this

For a free and secure internet.

No active alerts
Show all threats

Blog

Use cases versus hunting

Use cases are a traditional approach to gain insight into incidents in SIEM. The approach that is now emerging is that someone skilled in SIEM is hunting for new threats. Thinking out of the box is an important aspect of this approach. For example, can I stop this process remotely? What may cause critical business processes to fail?Read more »

SC Magazine recently has reviewed McAfee Enterprise Security Manager

SC Magazine recently has reviewed McAfee Enterprise Security Manager (ESM). The result is that SC Magazine recognized McAfee ESM as SC Labs Approved with a five star rating. The magazine states that McAfee Enterprise Security Manager, the heart of Intel Security’s Security Information & Event Management (SIEM) solution, is the gold standard for enterprise grade SIEMs.Read more »

Matryoshka dolls: analysing a packer for CTB locker

Rik van Duijn recently ran into a phishing campaign which was spreading CTB-Locker. Victims received an e-mail which looked to be originating from a Dutch web shop. In this email the recipient was informed about an order they placed for the game FIFA 15 for the PlayStation 3.Read more »

Still phishing (Phishing blog #2)

In his previous phishing blog, IT Security Expert Rik van Duijn described how phishing is increasingly being used to penetrate companies. In this new blog, he will discuss in more detail the different ways in which phishing attacks are executed. He will discuss the methods and techniques that attackers use.Read more »

Improve your IT- Security, more questions?

Our specialists are happy to help you.