NIL’s security operations center (SOC) won the Slovenian Security Product of the Year 2019 Award at the Infosek conference, which is one of the largest security events in the CE region. The award recognizes NIL’s leadership in providing superior threat detection and response capabilities, technological maturity, and high customer satisfaction.
CCIE Security is Cisco’s flagship security certification and one of the most respected cybersecurity career designations in the industry.
An important update in the preliminary OWASP Top 10 – 2017 rc1 report is the new vulnerability category Insufficient Attack Detection and Prevention that calls for proactive security mechanisms and ongoing attack protection methods.
The report highlights challenges and opportunities for security teams to defend against the relentless evolution of cybercrime and shifting attack modes.
Security assessments of IT systems in an age of e-commerce are becoming a necessity. In an interview for the financial newspaper Finance, our experts on information security Jan Bervar and Matevž Mesojednik explain which security threats companies are facing today and how to manage information security risks.
The report identifies the latest trends in cybersecurity, with special focus on ransomware – the most profitable malware type in history, and offers guidelines on what you can do to protect your organization and business.
The report—which presents research, insights, and perspectives from Cisco Security Research—highlights the challenges that defenders face in detecting and blocking attackers who employ a rich and ever-changing arsenal of tools.
The report provides an overview of the major threats observed in the first half of 2015, explores likely future trends and offers recommendations on how to be more resilient to fast-evolving security threats.
In today's changing security landscape, it's a race against attackers and defenders. Cisco security experts suggest that it is time for organizations to start viewing their approach to cybersecurity differently if they want to achieve real-world security.