Salih Yilmaz

View all authors posts further down below.

From Kahuna we want to make you aware of the fact that conducting a ‘post-incident’ investigation is crucial in closing the ‘security incident lifecycle’ within the framework of ‘lessons learned’ and continuous improvement of our resilience.

In the flowchart below you can easily find out which follow-up steps your organization can take. This flowchart is on the advice of the NCSC. However, Kahuna strongly advises all organisations that use Citrix to perform a post incident scan. We can help you with this or even carry it out completely for you!

NCSC

NCSC

In this analysis, Kahuna uses technical tooling to check your compromised systems related to the Citrix vulnerability (CVE2019-19781). In addition, an analyst from us will analyze the log data for you on suspicious ‘log lines’ that may lead to deviating traffic in your network. The end-result is a concrete advice on the activities to restore your system. The effort to achieve this result varies from 1-3 days. The condition, however, is that log data is available to Kahuna’s analysts.

For more information contact us via info@kahuna.nl or call +31 (0)33 4500 370.

From Kahuna we want to make you aware of the fact that conducting a ‘post-incident’ investigation is crucial in closing the ‘security incident lifecycle’ within the framework of ‘lessons learned’ and continuous improvement of our resilience.

In the flowchart below you can easily find out which follow-up steps your organization can take. This flowchart is on the advice of the NCSC. However, Kahuna strongly advises all organisations that use Citrix to perform a post incident scan. We can help you with this or even carry it out completely for you!

NCSC

NCSC

In this analysis, Kahuna uses technical tooling to check your compromised systems related to the Citrix vulnerability (CVE2019-19781). In addition, an analyst from us will analyze the log data for you on suspicious ‘log lines’ that may lead to deviating traffic in your network. The end-result is a concrete advice on the activities to restore your system. The effort to achieve this result varies from 1-3 days. The condition, however, is that log data is available to Kahuna’s analysts.

For more information contact us via info@kahuna.nl or call +31 (0)33 4500 370.

Kahuna new gold partner of Akamai Technologies as of 1 October 2019.

Pasqualle Verwoerdt: “We are very pleased with the Gold Partner status for Akamai in the BeNeLux. For us, Akamai is a strategic vendor and in addition to a unique and future-oriented approach in the area of Edge Computing, they also have the best ratings from Gartner and Forrester in their field”.

 

Cybereason, creators of the leading Cyber Defense Platform, today announced that G-Star Raw is the company’s newest customer. G-Star Raw is one of the world’s largest global denim companies. Cybereason worked jointly with its partner Kahuna Network Solutions, one of the leading IT infrastructure providers on this newest customer contract.

“With the installation of Cybereason’s award-winning solution, G-Star Raw now has a complete view of what is happening within our environment and we can detect and respond to potentially malicious activity quickly. Overall, the recent implementation was seamless and took only days to complete. In addition, to save time and limit additional risks, Cybereason is delivering additional security services to support G-Star’s growth,” said Edwin Blaak, Manager IT Infrastructure at G-Star.

“Cybereason is thrilled that G-Star is our newest international customer in the Benelux region and we look forward to working closely with Kahuna to ensure that malicious activities in their environment are detected and stopped before material damage can take place. Cybereason’s Cyber Defense Platform is the industry’s best at correlating more than 8 million incidents per second and giving retailers such as G-Star an opportunity to stay ahead of criminal activity and protect its assets,” said Kim Hansen, Sales Director Benelux and Denmark, Cybereason.

About G-Star
Since our creation in 1989, G-Star’s philosophy has always been, ‘Just the Product.’ This single-minded approach has led to many denim ‘firsts’: the introduction of ‘luxury denim for the streets,’ by fusing high-level craftsmanship with street level edge to create a new denim sector; the positioning of raw, untreated denim as a wearable and desirable material; and the evolution of our distinctive denim silhouette, through the adoption of architectural and 3-D thinking into denim construction.

About Cybereason 
Cybereason, creators of the leading Cyber Defense Platform, gives the advantage back to the defender through a completely new approach to cybersecurity. Cybereason offers endpoint detection and response (EDR), next-generation antivirus (NGAV), and active monitoring services, powered by its cross-machine correlation engine. The Cybereason suite of products provides unmatched visibility, increases analyst efficiency and effectiveness, and reduces security risk. Cybereason is privately held and is headquartered in Boston, with offices in LondonSydneyTel AvivTokyoAsia-Pacific and continental Europe.