The EnBITCon Blog
Threat Hunting: Five steps for successful hunting
With threat hunting and an effective emergency plan, you can increase the security of your company.
A true converged platform starts with a powerful network firewall
Nowadays it is difficult to make security appliances compatible with today's modern network.
Microsoft Azure Peering Service - What does a fast lane have to do with information security?
Microsoft Azure services are used in many large companies. These include, among others, the well-known...
Greenbone extends compliance guidelines for CIS benchmarks
Greenbone 2022 continues to build on the policies contained in the Greenbone Enterprise Feed.
FortiEDR in the MITRE Engenuity ATT&CK® Evaluation
FortiEDR blocks 100% of attacks in the MITRE Engenuity ATT&CK® evaluation for the second year in a row