By Sean Mason IT departments regularly ask us questions about their security posture, their security concerns, and specifically, the makeup of their Threat Management (TM) organizations. Generally speaking, Threat Management includes anything in the Intel-Detection-Response arena, generally encompassing Security Operations Centers, Intelligence Organizations, and Incident Response Teams. When it comes to the makeup of their TM organizations, companies […]

Source:: Cisco Security Notice

By Sean Mason IT departments regularly ask us questions about their security posture, their security concerns, and specifically, the makeup of their Threat Management (TM) organizations. Generally speaking, Threat Management includes anything in the Intel-Detection-Response arena, generally encompassing Security Operations Centers, Intelligence Organizations, and Incident Response Teams. When it comes to the makeup of their TM organizations, companies […]

Source:: Cisco Security Notice

Windows 7 bald nicht mehr vorinstalliert erhältlich

Alle PC-Hersteller dürfen nur noch bis zum 31.10.2016 Client-Systeme mit vorinstalliertem Windows 7 Betriebssystem ausliefern. Um die Verfügbarkeit bis zum 31.10.2016 sicherzustellen, können wir Ihre Orders für FUJITSU-PCs und Notebooks verbindlich nur noch bis zum 30.09.2016 entgegennehmen. Danach gilt die Lieferbarkeit lediglich noch für verfügbare Lagerware beim Distributor.

FUJITSU Produkte unterstützen aber auch über den 31.10.2016 hinaus vollumfänglich Windows 7 – das gilt sowohl für Hardware, als auch Treiber.

Fragen zur Verfügbarkeit und Ihre Aufträge nehmen gerne entgegen:

DSC_2022 klein
Jörg Wegner
02261 9155052
wegner@oberberg.net
DSC_2012 klein
Frank Erlinghagen
02261 9155055
erlinghagen@oberberg.net
Daniel Wenzlau
02261 9155054
wenzlau@oberberg.net

By Eric Hulse This is the first in a series of blogs about advanced malware Behavioral Indicators Morph Over Time A large part of Threat Grid’s efficacy in determining the nature of a submitted file is through the use of over 675 indicators to identify malware. The initial indicators created for AMP Threat Grid sought to identify strictly […]

Source:: Cisco Security Notice

By Eric Hulse This is the first in a series of blogs about advanced malware Behavioral Indicators Morph Over Time A large part of Threat Grid’s efficacy in determining the nature of a submitted file is through the use of over 675 indicators to identify malware. The initial indicators created for AMP Threat Grid sought to identify strictly […]

Source:: Cisco Security Notice

Source:: Innovaphone

Source:: Innovaphone