The EnBITCon Blog
Threat Hunting: Five steps for successful hunting
With threat hunting and an effective contingency plan, you can increase security for your company.
A true converged platform starts with a powerful network firewall
Nowadays it is difficult to make security appliances compatible with today's modern network.
Microsoft Azure Peering Service - What does a fast lane have to do with information security?
Many large companies use Microsoft Azure services. These include the best-known Azure application Office 365 with ser...
Greenbone extends compliance guidelines for CIS benchmarks
Greenbone 2022 continues to build out the policies contained in the Greenbone Enterprise Feed.