Turning Cybersecurity into a Strategic Advantage

By Ashley Arbuckle Most C-suite leaders think about cybersecurity as a way to stop threats. But in today’s intensely competitive digital economy they should be thinking about cybersecurity as a strategic advantage that not only protects business value, but enables new business value. The prevailing focus on threats to protect business value isn’t surprising. Modern digital businesses go […]

Source:: Cisco Security Notice

Windows Server 2016 jetzt erhältlich

Das Warten hat ein Ende- Microsofts Windows Server 2016 ist jetzt erhältlich.

Wie auf der Anwenderkonferenz Ignite angekündigt, ist Windows Server 2016 jetzt erhältlich. Nachdem am 17.10. die 180 Tage lauffähige Evaluierungsversion veröffentlicht wurde, sind jetzt auch die übrigen Editionen verfügbar.

Neben den Standard- und Datacenter-Editionen sind dies der Hyper-V-Server, der Storage-Server und die Essentials Version.

Der Hyper-V-Server ist wie die vorigen Ausgaben kostenlos erhältlich und nutzbar, der Storage-Server hingegen an Hardware-Bundles gebunden.

Die Essentials Edition ist wie zuvor für kleine Unternehmen mit weniger als 50 Nutzern gedacht.

Die Standard- und Datacenter-Editionen bieten jetzt neben den bekannten Installationsoptionen (Desktop Experience mit GUI oder Core Server ohne grafische Oberfläche) eine weitere an, den Nano Server.

Der Nano Server ist ein leichtgewichtiges Betriebssystem, das laut Microsoft nur etwa ein zwanzigstel der Größe des Server Core hat und nur absolut notwendige Komponenten, wie u.a. Hyper-V, Clustering und Networking, enthält.

Durch Verzicht auf eine grafische Oberfläche – wie schon bei der Core Installation – werden die Angriffspunkte auf die firmeneigene IT und die benötigten Patches und daraus resultierende Neustarts weiter verringert.

Mehr zum fortschrittlichen Microsoft Windows Server 2016 erfahren Sie gerne von uns:

DSC_2012 klein
Frank Erlinghagen
02261 9155055
erlinghagen@oberberg.net
DSC_2022 klein
Jörg Wegner
02261 9155052
wegner@oberberg.net
Daniel Wenzlau
02261 9155054
wenzlau@oberberg.net

MBRFilter – Can’t Touch This!

By Talos Group This post was authored by Edmund Brumaghin Summary Ransomware has become increasingly prevalent in the industry, and in many cases, unless there is a publicly released decryptor available, there is often not an easy means of retrieving encrypted files once a system has been infected. In addition to the creation and maintenance of regular system […]

Source:: Cisco Security Notice

MBRFilter – Can’t Touch This!

By Talos Group This post was authored by Edmund Brumaghin Summary Ransomware has become increasingly prevalent in the industry, and in many cases, unless there is a publicly released decryptor available, there is often not an easy means of retrieving encrypted files once a system has been infected. In addition to the creation and maintenance of regular system […]

Source:: Cisco Security Notice

Combatting Cybercrime with an Incident Response Plan

By Sean Mason Based on the cybersecurity news proliferating in the mainstream media today – from ransomware incidents to data breaches of massive proportions – it has become clear that organizations need to put security mechanisms in place to protect their IT infrastructure. Organizations commonly use anti-virus, firewall, intrusion prevention and other security technologies to protect themselves; but […]

Source:: Cisco Security Notice

Combatting Cybercrime with an Incident Response Plan

By Sean Mason Based on the cybersecurity news proliferating in the mainstream media today – from ransomware incidents to data breaches of massive proportions – it has become clear that organizations need to put security mechanisms in place to protect their IT infrastructure. Organizations commonly use anti-virus, firewall, intrusion prevention and other security technologies to protect themselves; but […]

Source:: Cisco Security Notice

Malicious Microsoft Office Documents Move Beyond InkPicture

By Ross Gibb In late August we began to detect malicious Microsoft Word documents that contained VisualBasic (VB) macro code and the code appeared to be triggering when the document was opened. However, the documents did not contain any of the standard events used to launch VB macro code when a document is opened, including Document_Open, or Auto_Open events. Upon […]

Source:: Cisco Security Notice

Malicious Microsoft Office Documents Move Beyond InkPicture

By Ross Gibb In late August we began to detect malicious Microsoft Word documents that contained VisualBasic (VB) macro code and the code appeared to be triggering when the document was opened. However, the documents did not contain any of the standard events used to launch VB macro code when a document is opened, including Document_Open, or Auto_Open events. Upon […]

Source:: Cisco Security Notice

Evolving Security Disclosures : The New OASIS Common Security Advisory Framework (CSAF) Technical Committee

By Omar Santos During the last few years we have witnessed how the cyber security threat landscape has evolved. The emergence of the Internet of Things combined with recent events have profoundly changed how we protect our systems and people, and drive us to think about new approaches for vendors to disclose security vulnerabilities to customers and consumers. […]

Source:: Cisco Security Notice

Evolving Security Disclosures : The New OASIS Common Security Advisory Framework (CSAF) Technical Committee

By Omar Santos During the last few years we have witnessed how the cyber security threat landscape has evolved. The emergence of the Internet of Things combined with recent events have profoundly changed how we protect our systems and people, and drive us to think about new approaches for vendors to disclose security vulnerabilities to customers and consumers. […]

Source:: Cisco Security Notice