Phone call Mail
Now free initial consultation by mail or phone: +49 228 - 33 88 89 0

The EnBITCon Blog

Threat Hunting: Five steps for successful hunting

With threat hunting and an effective emergency plan, you can increase the security of your company.
Published on 13 May 2022 Sophos   Cybersecurity, Cyber Threat, Cyberangriffe

A true converged platform starts with a powerful network firewall

Nowadays it is difficult to make security appliances compatible with today's modern network.
Published on 6 May 2022 Fortinet   Fortinet, Firewall, fortigate

Microsoft Azure Peering Service - What does a fast lane have to do with information security?

Microsoft Azure services are used in many large companies. These include, among others, the well-known...
Published on 29 April 2022 On our own behalf

Greenbone extends compliance guidelines for CIS benchmarks

Greenbone 2022 continues to build on the policies contained in the Greenbone Enterprise Feed.
Published on 25 April 2022 Greenbone   Cybersecurity, Update, Richtlinien

FortiEDR in the MITRE Engenuity ATT&CK® Evaluation

FortiEDR blocks 100% of attacks in the MITRE Engenuity ATT&CK® evaluation for the second year in a row
Published on 1 April 2022 Fortinet   Cybersecurity, Fortinet, EDR