What does Mirai & IoT botnets mean to the public sector?

By Gavin Reid 5 First Steps to Defending against IoT Driven DDoS Attacks In honor of October’s National Cybersecurity Awareness Month, users of Twitter, Netflix, Reddit and the New York Times were treated to a special treat – and just in time for Halloween. Unfortunately it was more of a trick as users of these and other major […]

Source:: Cisco Security Notice

Windows Server 2016 Lizensierung

Windows Server 2016 Lizensierung

Eine neue Version des Serverbetriebssystems von Microsoft ist gerade gestartet und wie immer gibt es auch Veränderungen im Lizenzmodell, die erst einmal verinnerlicht werden müssen. Auf einfache Art und Weise erklärt der neunmalkluge Cali Clever das aktuelle Lizenzmodell in einem kleinen Video:

Noch Fragen? Dann rufen Sie uns doch einfach kurz an und wir klären das für Sie:

Daniel Wenzlau
02261 9155054
wenzlau@oberberg.net
DSC_2012 klein
Frank Erlinghagen
02261 9155055
erlinghagen@oberberg.net
DSC_2022 klein
Jörg Wegner
02261 9155052
wegner@oberberg.net

The Case for Next-Gen Intrusion Prevention to Protect Digital Business

By David C. Stuart Today’s digital economy is growing at a phenomenal rate. All modes of commerce from entertainment to finance and retail have moved on-line. You name it; there is an on-line business for it. Not only does selling occur on-line, businesses run their operations online and virtually with cloud-based providers such as Microsoft Azure, Amazon Web Services, […]

Source:: Cisco Security Notice

The Case for Next-Gen Intrusion Prevention to Protect Digital Business

By David C. Stuart Today’s digital economy is growing at a phenomenal rate. All modes of commerce from entertainment to finance and retail have moved on-line. You name it; there is an on-line business for it. Not only does selling occur on-line, businesses run their operations online and virtually with cloud-based providers such as Microsoft Azure, Amazon Web Services, […]

Source:: Cisco Security Notice

Crashing Stacks Without Squishing Bugs: Advanced Vulnerability Analysis

By Talos Group Overview Crash triaging can be a long and complicated process; by using proper tools and having an optimal approach, we can make this a bit easier and less time consuming. In this post we describe a triaging strategy and toolset based on two examples of vulnerability classes: Stack based buffer overflow Heap based buffer overflow […]

Source:: Cisco Security Notice

Crashing Stacks Without Squishing Bugs: Advanced Vulnerability Analysis

By Talos Group Overview Crash triaging can be a long and complicated process; by using proper tools and having an optimal approach, we can make this a bit easier and less time consuming. In this post we describe a triaging strategy and toolset based on two examples of vulnerability classes: Stack based buffer overflow Heap based buffer overflow […]

Source:: Cisco Security Notice