Sarwent Malware Report

Sarwent Malware Report

Security researchers have detected a new version of Sarwent Malware software used by attackers to provide easier access to infected computers. It is predicted that the attackers are preparing to sell their remote access rights to computers on illegal cyber platforms thanks to this malware. Our detailed analysis and solution suggestions regarding Sarwent Malware are online!

DETAILS
Precautions To Be Taken For Remote Access Security In 16 Steps!

Precautions To Be Taken For Remote Access Security In 16 Steps!

Our need for technological infrastructure that will provide secure remote access becomes more and more important day by day. We know the precautions to be taken for your security in your remote access process.   We are at your side with our solutions and services for remote access security in 16 steps!

DETAILS
Our Information Report About Coronavirus Phishing Attacks Is Online!

Our Information Report About Coronavirus Phishing Attacks Is Online!

Did you know that cyber attackers are trying to have your personal information illegally by taking advantage of the coronavirus epidemic? You could review the report "Coronavirus Phishing Attacks" which we analyzed with real examples you may encounter!

DETAILS
Threat Intelligence for Fraud Prevention

Threat Intelligence for Fraud Prevention

Stand and Deliver! Since the birth of commerce, criminals have looked for ways to make an easy profit from those in possession of assets and to make the most of technology available at the time. In 17th century England, for example, the growth in coach travel among an affluent merchant class, combined with the invention of the portable flintlock pistol, gave rise to the highwayman.

DETAILS
F5 BIG-IQ CENTRALIZED MANAGEMENT PLATFORM

F5 BIG-IQ CENTRALIZED MANAGEMENT PLATFORM

Control application delivery and security end-to-end from a single pane of glass.

DETAILS
Louisiana State Government Hit by Ransomware Attack Forcing Server Shutdowns

Louisiana State Government Hit by Ransomware Attack Forcing Server Shutdowns

Targeted ransomware attacks on banking and finance, government, healthcare, and critical infrastructure are on the rise, with the latest victim being the state government of Louisiana.

DETAILS
Announcing Hitachi Content Intelligence v1.5

Announcing Hitachi Content Intelligence v1.5

Maximize the value of your enterprise data, wherever it resides, to deliver the best quality information to where and when it’s needed most. From deeper integrations with Hitachi Content Platform, to customized searches, and improved data processing and scalability, the latest release of Content Intelligence comes with many great new features and enhancements to an already-robust data processing solution.

DETAILS
Threat Intelligence for Digital Risk Protection

Threat Intelligence for Digital Risk Protection

We will look at how threat intelligence can help detect and remediate digital risks. This scenario spans the org chart, but still needs to be approached in a systematic, methodical way.

DETAILS
BigFix Compliance

BigFix Compliance

As the number of endpoints and the threats that can compromise them continue to grow at an unprecedented rate, BigFix®Compliance provides unified, real-time visibility and enforcement to protect complex and highly distributed environments.

DETAILS
5 Places Where Hackers Are Stealthily Stealing Your Data In 2019

5 Places Where Hackers Are Stealthily Stealing Your Data In 2019

Skyrocketing data breaches bring incalculable losses to organizations and can cost cybersecurity executives their jobs.

DETAILS
Symantec Encrypted Tap

Symantec Encrypted Tap

Complete Visibility, Compliance, and Logging

DETAILS
 F5 BIG-IP DNS FOR SERVICE PROVIDERS

F5 BIG-IP DNS FOR SERVICE PROVIDERS

A carrier-grade DNS-resolving solution with hyperscaling and security services that enable faster web browsing with low latency.

DETAILS
The IBM® QRadar® Advisor with Watson™

The IBM® QRadar® Advisor with Watson™

The QRadar Advisor with Watson app uses IBM Cognitive Artificial Intelligence to assist users with incident and risk analysis, triage and response, and enables security operations teams to do more, with greater accuracy.

DETAILS
10 Things About the Dark Web You Probably Didn’t Know

10 Things About the Dark Web You Probably Didn’t Know

Mention the dark web and many people summon imagery of a massive, mysterious online criminal underground, where all manner of products and information are bought, sold, and traded, hidden away from the prying eyes of the public and law enforcement.

DETAILS
SPLUNK® INVESTIGATE

SPLUNK® INVESTIGATE

Investigation and action across any data source – start collaborating with your team in minutes.

DETAILS
Modernize File Services, Improve the Bottom Line

Modernize File Services, Improve the Bottom Line

File-based data accounts for more than 80% of capacity demand in a typical IT infrastructure. Traditional infrastructure requires the labor-intensive management of file servers, NAS and data protection appliances, and software.

DETAILS
New WhatsApp Bug

New WhatsApp Bug

New WhatsApp Bug Could Have Let Hackers Secretly Install Spyware On Your Devices

DETAILS
WHY OFFICE 365?

WHY OFFICE 365?

Many organizations will implement third-party solutions.

DETAILS
Threat Intelligence for Incident Response

Threat Intelligence for Incident Response

Of all security groups, incident response teams are per- haps the most highly stressed.

DETAILS
BigFix Inventory

BigFix Inventory

Maintain software audit readiness and mitigate security risks with software compliance and usage.

DETAILS
Splunk Data Fabric Search

Splunk Data Fabric Search

Fast analysis across your entire data ecosystem

DETAILS
SECRET VAULT-PRIVILEGED ACCOUNT MANAGEMENT

SECRET VAULT-PRIVILEGED ACCOUNT MANAGEMENT

Discover, manage, protect, and audit privileged passwords across your organization

DETAILS
Hackers Targeting Businesses with Financially Motivated Cyber Attacks!

Hackers Targeting Businesses with Financially Motivated Cyber Attacks!

Security researchers have tracked down activities of a new group of financially-motivated hackers that are targeting several businesses and organizations in Germany, Italy, and the United States in an attempt to infect them with backdoor, banking Trojan, or ransomware malware.

DETAILS
HOW TO DEVELOP A COMPREHENSIVE PAM SOLUTION

HOW TO DEVELOP A COMPREHENSIVE PAM SOLUTION

The overall goal when implementing PAM solutions is to arm IT and security professionals with the tools they need to control access within their corporate environment, thus reducing the attack surface by limiting privileged access and behavior.

DETAILS
Choose Hitachi  Content  Platform (HCP)

Choose Hitachi Content Platform (HCP)

Unstructured data growth and application proliferation continue to accelerate. These developments lead to increased server and storage sprawl, with numerous silos of infrastructure supporting traditional and new workloads.

DETAILS
Two Hackers Who Extorted Money From Uber and LinkedIn Plead Guilty

Two Hackers Who Extorted Money From Uber and LinkedIn Plead Guilty

Two grey hat hackers have pleaded guilty to blackmailing Uber, LinkedIn, and other U.S. corporations for money in exchange for promises to delete data of millions of customers they had stolen in late 2016.

DETAILS
 The Six Phases of the Threat Intelligence Lifecycle

The Six Phases of the Threat Intelligence Lifecycle

Threat intelligence is built on analytic techniques honed over several decades by government and military agencies. Traditional intelligence focuses on six distinct phases that make up what is called the “intelligence cycle”:Threat intelligence provides an antidote to many of these problems. Among other uses, it can be employed to filter out false alarms, speed up triage, and simplify incident analysis.

DETAILS
Splunk Data Stream Processor

Splunk Data Stream Processor

A real-time stream processing solution that collects, processes and delivers data to Splunk and other destinations in milliseconds.

DETAILS
Thrive in the Face of Cyberattacks and Business Crises

Thrive in the Face of Cyberattacks and Business Crises

By arming incident response teams with work flows, Dynamic Playbooks, intelligence, and deep-data analytics, the Resilient Security Module helps organizations react faster, coordinate better, and respond smarter to security incidents.

DETAILS
Why Metadata Matters

Why Metadata Matters

Filesystems typically only collect a few minor data points about the information they hold: a user-designated filename; a three-letter extension for a loose association with an application; creation, modification and access dates; and a few check-box system-based attributes. Some applications such as office suites and media-creation apps, as well as endpoint devices such as digital cameras and smartphones generate additional metadata, but that information is imbedded as part of the file and thus hidden and underutilized.

DETAILS
Detecting Advanced Threats and Evasive Malware with Symantec Cynic™

Detecting Advanced Threats and Evasive Malware with Symantec Cynic™

Threat actors have access to malware development tools that make it cheap and easy to develop customized targeted malware that is undetectable by traditional security systems.

DETAILS
A Guide to Cyber Security Teams Success

A Guide to Cyber Security Teams Success

Cyber security is a hot topic as the world has witnessed a rapid increase in cyber-attacks, data breaches, data leaks and espionage.

DETAILS
 AUTOMATE DEVOPS/SECOPS DEPLOYMENT WITH CI/CD PIPELINE INTEGRATIONS

AUTOMATE DEVOPS/SECOPS DEPLOYMENT WITH CI/CD PIPELINE INTEGRATIONS

The continuous integration and continuous delivery (CI/CD) practices of software development promise to bring new software or new features to market faster.

DETAILS
 Reactive  IT Is So Yesterday!

Reactive IT Is So Yesterday!

In the age of Amazon and same-day delivery, today’s customers demand a seamless and undisturbed online experience. They expect applications and websites to be up and running at peak performance, 24/7. If you’re an organization that continues to push your business to implement a next-gen digital model to support these demands, you likely have started to explore what artificial intelligence (AI) and predictive capabilities could mean for both IT and the business.

DETAILS
Russian Hackers Targeting Anti-Doping Agencies Ahead of 2020 Tokyo Olympics

Russian Hackers Targeting Anti-Doping Agencies Ahead of 2020 Tokyo Olympics

As Japan gears up for the upcoming 2020 Summer Olympics in Tokyo for the next year, the country needs to brace itself for sophisticated cyberattacks, especially from state-sponsored hackers.

DETAILS
 What Have You Heard About Threat Intelligence?

What Have You Heard About Threat Intelligence?

You may have heard threat intelligence discussed at a conference or trade show. Perhaps you were informed by a consultant that threat intelligence provides external context for security decisions. Maybe you read a report about state-sponsored attacks and want to know how to protect your enterprise.

DETAILS
Take Control of Service Account Governance

Take Control of Service Account Governance

Secure, provision, and decommission accounts to harden your attack surface.

DETAILS
WHAT IS COLLECTD?

WHAT IS COLLECTD?

Metrics are measurements that provide a regular data point around a given metric, such as CPU utilization.

DETAILS
Automating and Enriching Incident Response

Automating and Enriching Incident Response

The Resilient Action Module—a critical and innovative extension of the Resilient Incident Response Platform (IRP)—orchestrates incident response by connecting response procedures with the related cybersecurity systems, enabling enrichment and remediation actions to drive a rapid and effective response effort.

DETAILS
F5 SSL Orchestrator and Dynamic Service Chains

F5 SSL Orchestrator and Dynamic Service Chains

Organizations need to protect critical assets from threats that originate both outside and inside the corporate environment.

DETAILS
The IBM QRadar Security Intelligence Platform

The IBM QRadar Security Intelligence Platform

More than just a SIEM, the IBM QRadar Security Intelligence Platform offers organizations a broad set of automated and integrated security analytics, purpose-built to help eliminate blind spots and accelerate monitoring, detection and investigation workflows.

DETAILS
ProxySG S200/S400/S500

ProxySG S200/S400/S500

Advanced Web Security for Today’s Global Enterprises:

DETAILS
How poor shortcut handling can derail your email archive migration to Office 365

How poor shortcut handling can derail your email archive migration to Office 365

Imagine trying to open an email post-migration to Office 365, and you just get …. nothing.

DETAILS
Build a Data  Governance Strategy for the New Digital Era

Build a Data Governance Strategy for the New Digital Era

The Hitachi Vantara object storage solution, called Hitachi Content Platform (HCP), changes all of this.

DETAILS
Imperva SecureSphere Appliances

Imperva SecureSphere Appliances

Imperva SecureSphere® appliances provide superior performance and resiliency for demanding data center environments. With fail open interfaces, SecureSphere platforms offer fast and cost-effective fail over. Out-of-band management enhances security, while front panel status messages and network interfaces improve manageability.

DETAILS
Symantec Web Isolation

Symantec Web Isolation

Advanced Threat Prevention Capabilities for Secure Web Gateways

DETAILS
Supercharging SOAR Solutions With Threat Intelligence

Supercharging SOAR Solutions With Threat Intelligence

Orchestration and automation are key drivers for digital transformation, enabling organizations to optimize existing processes, lower costs, fill personnel gaps, and gain a competitive edge.

DETAILS
HCL BigFix Lifecycle

HCL BigFix Lifecycle

Reduce cost, risk and complexity of managing servers, desktops, laptops, point-of-sale and other devices.

DETAILS
Phorpiex Botnet Sending Out Millions of Sextortion Emails Using Hacked Computers

Phorpiex Botnet Sending Out Millions of Sextortion Emails Using Hacked Computers

A decade-old botnet malware that currently controls over 450,000 computers worldwide has recently shifted its operations from infecting machines with ransomware or crypto miners to abusing them for sending out sextortion emails to millions of innocent people.

DETAILS
Privileged Account Management At Enterprise Scale

Privileged Account Management At Enterprise Scale

Discover, manage, protect, and audit privileged account access across your organization.

DETAILS
 Over A Billion Malicious Ad Impressions Exploit WebKit Flaw to Target Apple Users

Over A Billion Malicious Ad Impressions Exploit WebKit Flaw to Target Apple Users

The infamous eGobbler hacking group that surfaced online earlier this year with massive malvertising campaigns has now been caught running a new campaign exploiting two browser vulnerabilities to show intrusive pop-up ads and forcefully redirect users to malicious websites.

DETAILS
ADVANCED APPLICATION THREATS REQUIRE AN ADVANCED WAF

ADVANCED APPLICATION THREATS REQUIRE AN ADVANCED WAF

The threat landscape is dramatically different than it was just 5 years ago. A traditional web application firewall (WAF) was once a very effective solution for mitigating application layer attacks, but now has trouble keeping up with the advanced capabilities and agility of attackers. Signatures often lag behind new exploits.

DETAILS
 Digital Rights Management for Data Monitoring and Control

Digital Rights Management for Data Monitoring and Control

After you leave your data organization, how can you control it? With Information-Based Encryption, you can keep data safe by maintaining continuous protection, monitoring and access control in real time, dynamically canceling user access, or remotely deleting access to a document.

DETAILS
 QRadar Scalable, Centralized and Flexible Platform!

QRadar Scalable, Centralized and Flexible Platform!

Take advantage of the QRadar ecosystem to easily integrate with other solutions and quickly update capabilities.

DETAILS
5 reasons Why You Might Want to Re-think Keeping Legacy Archives On-premises:

5 reasons Why You Might Want to Re-think Keeping Legacy Archives On-premises:

Here’s 5 reasons why you might want to re-think keeping legacy archives on-premises:

DETAILS
Hitachi Content Platform Solution

Hitachi Content Platform Solution

In 2014, HDS launched a corporate social innovation strategy geared toward the 3rd Platform that encompasses all of its products, particularly HCP. IDC believes HDS' HCP-related product development efforts, announcements, and focus on content mobility represents one of boldest strategies of the company yet.

DETAILS
Select the Best Endpoint  Management Solution

Select the Best Endpoint Management Solution

Securing and Managing Thousands of Endpoints

DETAILS
Splunk Business Intelligence Guide

Splunk Business Intelligence Guide

Converting Machine-Generated Data to Real-Time Intelligence

DETAILS
Threat intelligence capabilities can make your digital businesses more resilient!

Threat intelligence capabilities can make your digital businesses more resilient!

Security and risk management leaders will need to evaluate the capabilities and features of TI offerings and match them to the needs of their security programs.

DETAILS
New 0-Day Flaw Affecting Most Android Phones Being Exploited in the Wild

New 0-Day Flaw Affecting Most Android Phones Being Exploited in the Wild

Another day, another revelation of a critical unpatched zero-day vulnerability, this time in the world's most widely used mobile operating system, Android.

DETAILS
Why is Splunk Enterprise Different?

Why is Splunk Enterprise Different?

Splunk Enterprise has completely different management, controlling and securing approaches from its competitors. So how does that work?

DETAILS
New Critical Exim Flaw Exposes Email Servers to Remote Attacks

New Critical Exim Flaw Exposes Email Servers to Remote Attacks

A critical security vulnerability has been discovered and fixed in the popular open-source Exim email server software, which could allow a remote attacker to simply crash or potentially execute malicious code on targeted servers.

DETAILS
Attack methods in Financial Institutions

Attack methods in Financial Institutions

There are multiple ways for an attacker to profit from a compromised computer. Infostealer.Shifu, for example, is a sophisticated banking Trojan that contains the typical features used for financial fraud

DETAILS
When Scoping Requirements for SOAR

When Scoping Requirements for SOAR

Requirements for automation and orchestration stretch far wider than simple process-driven functions in the processing of alerting from security toolsets.

DETAILS
Market Guide for Zero Trust Network Access

Market Guide for Zero Trust Network Access

Zero trust network access replaces traditional technologies, which require companies to extend excessive trust to employees and partners to connect and collaborate. Security and risk management leaders should plan pilot ZTNA projects for employee/partner-facing applications.

DETAILS
Platin Bilişim -Sponsorhips

Platin Bilişim -Sponsorhips

Platin Bilişim has been a sponsor of Splun Discovery event.

DETAILS
Threat Intelligence Operations!

Threat Intelligence Operations!

According to ESG research, 72% of cybersecurity professionals surveyed say that security analytics and operations is more difficult today than it was two years ago. Why?

DETAILS
Biggest Data Breach Case of Ecuador’s History

Biggest Data Breach Case of Ecuador’s History

Ecuador officials have arrested the general manager of IT consulting firm Novaestrat after the personal details of almost the entire population of the Republic of Ecuador left exposed online in what seems to be the most significant data breach in the country's history.

DETAILS
FAQ

FAQ's About Transvault

How rapid? How it makes all comply?

DETAILS
  UNMATCHED DNS PERFORMANCE

UNMATCHED DNS PERFORMANCE

BIG-IP DNS delivers hyperscale performance that can handle even the busiest apps and websites. When apps have a volume spike in DNS queries due to legitimate requests or DDoS attacks, BIG-IP DNS manages requests with multicore processing and F5 DNS Express™, dramatically increasing authoritative DNS performance up to 50 million RPS to quickly respond to all queries.

DETAILS
TransVault  gives you the option of a DIY move or a complete, end-to-end migration service.

TransVault gives you the option of a DIY move or a complete, end-to-end migration service.

Our self-service approach with minimal assistance is designed to empower your own IT team to oversee a migration.

DETAILS
Make Sure SOAR Benefits Your Organization When Using an MSSP

Make Sure SOAR Benefits Your Organization When Using an MSSP

It is a common occurrence to hear the term SOAR in the context of managed security service provider (MSSP)-led services, and MSSPs have well-established security operations processes.

DETAILS
E-mail Content Security is Still Critical for Protecting Your Enterprise

E-mail Content Security is Still Critical for Protecting Your Enterprise

E-mail is a critical business function deeply embedded in the dna of business processes. its openness and ubiquity also make email a platform for credential phishing attempts, malware, spam, and business email compromise (Bec).

DETAILS
Cyber Success from Frecnh Police!

Cyber Success from Frecnh Police!

Remotely Removed RETADUP Malware from 850,000 Infected PCs

DETAILS
Protect Your Service Accounts With PAM!

Protect Your Service Accounts With PAM!

Protect Your Service Accounts With PAM, Thycotic!

DETAILS
Hitachi Vantara’s HCP: Securing Regulatory Compliance Data for the Modern Enterprise

Hitachi Vantara’s HCP: Securing Regulatory Compliance Data for the Modern Enterprise

Hitachi Vantara’s HCP software-defined storage solution is a scalable object storage technology designed for immutability.

DETAILS
How ready is your organization for the SOAR Platform?

How ready is your organization for the SOAR Platform?

Specific offerings branded as security orchestration, automation and response (SOAR) have been in the market since late 2017, with most focused on how to make security detection functions more effective and efficient.

DETAILS
SPUNK BUSİNESS ANALYTICS

SPUNK BUSİNESS ANALYTICS

As organizations digitize more and more of their business operations, new challenges emerge to achieving operational excellence and adhering to critical performance indicators, like cycle time and conversion rates.

DETAILS
Manage and scale Diameter signaling for your network!

Manage and scale Diameter signaling for your network!

From phones to cars to refrigerators, more and more of our world is connected. Customers’ expectations for performance and reliability are also increasing.

DETAILS
Considering Splunk Business Flow

Considering Splunk Business Flow

Splunk is a publicly-traded company based in San Francisco, Calif., with over 4,000 employees worldwide and 90+ Fortune 100 customers.

DETAILS
A Summer of Discontent: The Hottest Malware Hits

A Summer of Discontent: The Hottest Malware Hits

It's been a summer of ransomware hold-ups, supply chain attacks and fileless attacks flying under the radar of old-school security. With malware running amok while we were lying on the beach, here's a recap of the most burning strains and trends seen in the wild during the months of July and August 2019.

DETAILS
Symantec’s Web Security Architecture

Symantec’s Web Security Architecture

Preemptive, layered web defenses

DETAILS
 Attention! Verbis Registration Time Extended!

Attention! Verbis Registration Time Extended!

The deadline for the registration of personal data was extended until 31 December.

DETAILS
CORPORATE SECURITY = IDENTITY SECURITY + BOT MANAGEMENT

CORPORATE SECURITY = IDENTITY SECURITY + BOT MANAGEMENT

THE IMPROVED SECURITY APPROACH CAN STOP OR REDUCE TODAY'S STRONG CREDIT STUDIES.

DETAILS
A Flight Booking Site Exposed Personal Info on Customers!

A Flight Booking Site Exposed Personal Info on Customers!

A data breach at flight booking site exposed personal details on passengers and their flight and travel plans.

DETAILS
 VERBIS Registration Deadline!

VERBIS Registration Deadline!

Time is running out in the latest records for the data responsibles!

DETAILS
Voices the Efficiency of Your Security Teams Increase with Future!

Voices the Efficiency of Your Security Teams Increase with Future!

Voices the Efficiency of Your Security Teams Increase with Future! Create Rich Content Adding Clarity

DETAILS
Enterprise Data Protection:A Four-Step Plan

Enterprise Data Protection:A Four-Step Plan

An Interactive Buyers’ Guide and Checklist

DETAILS
Capital One Data Breach Affects 106 Million Customers; Hacker Arrested

Capital One Data Breach Affects 106 Million Customers; Hacker Arrested

Capital One Data Breach Affects 106 Million Customers; Hacker Arrested

DETAILS
 Quite Dangerous Windows ‘BlueKeep’ Vulnerability!

Quite Dangerous Windows ‘BlueKeep’ Vulnerability!

Researchers from the US government contractor Immunity developed a code for the feared Windows vulnerability known as BlueKeep.

DETAILS
F5 Advanced Web Application Firewall

F5 Advanced Web Application Firewall

At the application level, the threat mechanism is now very different from 5 years ago. Traditional Web Application Firewall has been very effective in the last 5 years and is still in effect. However, new defense mechanisms are needed in the next 10 years.

DETAILS
Cyber Crime Continues to Plague Banks and Bank Customers!

Cyber Crime Continues to Plague Banks and Bank Customers!

The recently released 2019 Verizon Data Breach Investigations Report and 2018 FBI Internet Crime Complaint Center Report highlight an increasing cyber threat landscape.

DETAILS
SOC  (Security Operation Center)

SOC (Security Operation Center)

What is SOC?

DETAILS
Powerful FinSpy Spyware Found Targeting iOS and Android Users in Myanmar!

Powerful FinSpy Spyware Found Targeting iOS and Android Users in Myanmar!

One of the most powerful, infamous, and advanced piece of government-grade commercial surveillance spyware dubbed FinSpy—also known as FinFisher—has been discovered in the wild targeting users in Myanmar.

DETAILS
ProxySG & ASM

ProxySG & ASM

Symantec ProxySG and Advanced Secure Gateway (ASG) extend the powerful networking capabilities for Symantec Integrated Cyber ​​Defense.

DETAILS
SDLC & S-SDLC (Software Development Life Cycle & Secure-Software Development Lifecycle)

SDLC & S-SDLC (Software Development Life Cycle & Secure-Software Development Lifecycle)

SDLC is the process to be followed for a software project. In other words, it is a structured way to create and develop software.

DETAILS
 Security Awareness in 7 Steps for End User!

Security Awareness in 7 Steps for End User!

One of the most important risks that threaten information security is the lack of awareness of employees about security.

DETAILS
HAPPY FATHER

HAPPY FATHER's DAY!

Happy Father's Day!

DETAILS
 Cisco ACI (APIC) - Scalable Application Deployment with F5 Private Cloud Solution

Cisco ACI (APIC) - Scalable Application Deployment with F5 Private Cloud Solution

At 10 pm on July 16, Cisco and F5 Networks, which have been collaborating for some time at the PDTCentral webinar, will talk about the Cloud and central management efforts that they have implemented in the ACI (APIC) application control center.

DETAILS
Hackers Breach Stack Overflow Q&A Site, Some Users

Hackers Breach Stack Overflow Q&A Site, Some Users' Data Exposed

Stack Overflow, one of the largest question and answer site for programmers, revealed today that unknown hackers managed to exploit a bug in its development tier and then almost a week after they gained unauthorized access to its production version.

DETAILS
May 19 Atatürk Commemoration, Youth and Sports Day Happy Birthday!

May 19 Atatürk Commemoration, Youth and Sports Day Happy Birthday!

May 19 Atatürk Commemoration, Youth and Sports Day Happy Birthday!

DETAILS
What is User Entity Behavior Analytics (UEBA)?

What is User Entity Behavior Analytics (UEBA)?

What is UEBA and how does it work?

DETAILS
North Korean Hackers Use ELECTRICFISH Tunnels to Filter Data!

North Korean Hackers Use ELECTRICFISH Tunnels to Filter Data!

The US Department of National Security (DHS) and the FBI have made a common warning about a new piece of malware that the North Korean APT hacking group, Hidden Cobra, actively uses.

DETAILS
Mother’s Day 2019!

Mother’s Day 2019!

Happy Mother’s Day!

DETAILS
What should we pay attention to when integrating ICT + DLP?

What should we pay attention to when integrating ICT + DLP?

When integrating Information Oriented Labeling (ICT) with Data Loss Prevention (DLP), keep these best practices in mind:

DETAILS
Attention Qbot! Malicious software that stole passwords, developed a new tactic to hide!

Attention Qbot! Malicious software that stole passwords, developed a new tactic to hide!

The Windows malware campaign reappears with new techniques to try to stay under the radar.

DETAILS
Violations, Identity Theft and Malware!

Violations, Identity Theft and Malware!

More recently, Scott County Schools in Kentucky fell victim to a $ 3.7 million phishing scam.

DETAILS
Happy May 1st!

Happy May 1st!

Happy May 1st Labor and Solidarity Day!

DETAILS
Symantec Content and Malware Analysis

Symantec Content and Malware Analysis

Content Analysis is the most effective way to detect file-based malware.

DETAILS
Scranos: Discovery of New Rapidly Developing Spyware with Rootkit Feature!

Scranos: Discovery of New Rapidly Developing Spyware with Rootkit Feature!

A new spyware operation with rootkits was discovered, in which hackers distribute multifunctional malicious software, such as video players, drivers, and even software that are shown as legitimate software, such as antivirus products, or trojan-popped applications.

DETAILS
Cyber Newsletter April!

Cyber Newsletter April!

Cyber Bulletin Published in April!

DETAILS
April 23 National Sovereignty and Children

April 23 National Sovereignty and Children's Day!

Happy April 23rd National Sovereignty and Children's Day! #23Nisan #23NisanUlusalEgemenlikveÇocukBayramı #ÇocukBayramı #23NisanKutluOlsun #Atatürk #Bayram #MustafaKemal #MustafaKemalAtatürk #DünyaÇocukları #Children #PlatinBilişim

DETAILS
SSL Visibility Appliance

SSL Visibility Appliance

What are the functions of Symantec's SSL Visibility device?

DETAILS
Get well soon!

Get well soon!

The historic cathedral in France turned to ash in tears.

DETAILS
ISTR 2019: Internet of Things Cyber Attacks Growing Different!

ISTR 2019: Internet of Things Cyber Attacks Growing Different!

Attackers can stop or disrupt the actions of IoT devices that control equipment or otherwise interact with the physical world.

DETAILS
Giant Purchase from Veritas!

Giant Purchase from Veritas!

Veritas acquires APTARE to improve the analysis, reporting and protection of enterprise data! The industry's first end-to-end analytics platform allows customers to review all their data wherever they are.

DETAILS
Enterprise Privilege Distribution, Management and Analysis Simple New Privilege Manager!

Enterprise Privilege Distribution, Management and Analysis Simple New Privilege Manager!

The new Privilege Manager capabilities allow you to scale while saving a lot of time and resources!

DETAILS
SEP

SEP's Unknown: HOST INTEGRITY!

The unknown aspect of SEP: What is Host Integrity?

DETAILS
THYCOTİC, the Leader of PAM!

THYCOTİC, the Leader of PAM!

Thycotic Wins Leadership Compass on the New KuppingerCole for Privileged Access Management (PAM)!

DETAILS
May 19 Atatürk Commemoration, Youth and Sports Day Happy Birthday!

May 19 Atatürk Commemoration, Youth and Sports Day Happy Birthday!

DETAILS
Platin Bilişim Has Been Ranked in 155  in Bilişim 500 -2016

Platin Bilişim Has Been Ranked in 155 in Bilişim 500 -2016

Bilişim 500 is a very famous competition in Turkey, that evaluates ict companies and their sub categories in detail announced results. Platin Bilişim has been ranked in 155 this year!

DETAILS
Platin Bilişim Has Been Premier Partner of Blue Coat!

Platin Bilişim Has Been Premier Partner of Blue Coat!

Platin Bilişim has been premier partner of Blue Coat, Ayhan Bamyacı General Manager of Platin Bilişim evaluated this new upgrade: Our financial targets are increasing on the new quarter. We are happy with our partnership with Blue Coat”

DETAILS
Platin Support Portal Has Been Renewed!

Platin Support Portal Has Been Renewed!

Platin Bilişim General Manager Ayhan Bamyacı said that we invested that field because we are giving importance to our customer relationships. In the end our customers can solve their problems via our new support portal and helpdesk.

DETAILS
Platin Bilişim is Telling!

Platin Bilişim is Telling!

We talked with Cemiler Denerel Başak-Senior Systems Engineer about “Information Security in a New Communications Era” You can watch our Platin Bilişim is telling sessions from our website.

DETAILS
Platin Bilişim is Introducing New Appliances!

Platin Bilişim is Introducing New Appliances!

Platin Bilişim provides appliances for Netbackup and Qradar products, you can contact us about the solutions.

DETAILS
New Logo of Qrtime is Ready!

New Logo of Qrtime is Ready!

As Platin Bilişim we trust our new software called Qrtime. Ayhan Bamyacı, General Manager of Platin Bilişim explained: “We branded our new product and prepared a new logo for it. I wish suceess for my engineers. We are a good team. “

DETAILS
4 Different Models of IBM Platin Bilişim Provides!

4 Different Models of IBM Platin Bilişim Provides!

Everyday we are faceing new security problems, companies started to look for innovative solutions.

DETAILS