Why Aging Infrastructure Is a Growing Problem

By Anthony Grieco Defending a network against threats of growing complexity requires a mix of technology and policies that are as sophisticated as the campaigns created by attackers. A necessary component to an efffective defense includes tackling the low-hanging fruit—that is, basic tasks such as patching vulnerabilities and updating old software. However, as we relate in the Cisco 2016 Annual Security Report too many organizations are relying on seriously outdated network components and operating systems—thus providing even more opportunity for adversaries to infiltrate or attack their network. As []

Source:: Cisco Security Notice

Why Aging Infrastructure Is a Growing Problem

By Anthony Grieco Defending a network against threats of growing complexity requires a mix of technology and policies that are as sophisticated as the campaigns created by attackers. A necessary component to an efffective defense includes tackling the low-hanging fruit—that is, basic tasks such as patching vulnerabilities and updating old software. However, as we relate in the Cisco 2016 Annual Security Report too many organizations are relying on seriously outdated network components and operating systems—thus providing even more opportunity for adversaries to infiltrate or attack their network. As []

Source:: Cisco Security Notice

Fujitsu PRIMERGY Sonderaktion CAL4Free

Fujitsu PRIMERGY Sonderaktion CAL4Free

Bis zum 31.01.2016 gilt die Sonderaktion unseres Technologiepartners Fujitsu. Zu einem qualifizierten Bundle aus einem Fujitsu PRIMERGY Servers (VFY, sprechen Sie mit uns über das für Sie passende Modell) und einer Microsoft Windows Server Lizenz erhalten Sie kostenfreie Windows Server CAL Lizenzen. Im Einzelnen sind das 5 freie CALs beim Erwerb von Windows Server Standard und 20 freie CALs beim Erwerb der Data Center Version.

Lassen Sie uns über Ihr Einsatzszenario sprechen und die passende Variante finden. Ihren Termin vereinbaren Sie ganz leicht unter 02261 915500 oder mit einer Mail an vertrieb@oberberg.net

 

The Value of Collaboration in Weakening Attackers

By Craig Williams Today’s attackers deploy complex and clever threats that are difficult to combat with just one method of defense. In some cases, defenders must go beyond tools for detecting attacks and devise a different approach for obstructing our adversaries‘ ability to operate.
As detailed in the Cisco 2016 Annual Security Report

Source:: Cisco Security Notice

The Value of Collaboration in Weakening Attackers

By Craig Williams Today’s attackers deploy complex and clever threats that are difficult to combat with just one method of defense. In some cases, defenders must go beyond tools for detecting attacks and devise a different approach for obstructing our adversaries‘ ability to operate.
As detailed in the Cisco 2016 Annual Security Report

Source:: Cisco Security Notice

Forewarned Is Forearmed: Announcing the 2016 Cisco Annual Security Report

By John Stewart Our just-released 2016 Cisco Annual Security Report (ASR) presents a challenging cybersecurity landscape: cyber defense teams are fighting to keep up with rapid global digitization while trying to integrate dozens of vendor solutions, speed up detection, and educate their organizations from top to bottom. Meanwhile attackers grow more bold, flexible, and resilient by the day, setting up professional infrastructures that look a lot like what we’d find in legitimate businesses. On the global front, we see fluctuations in cyber Internet governance across regions, which []

Source:: Cisco Security Notice

Forewarned Is Forearmed: Announcing the 2016 Cisco Annual Security Report

By John Stewart Our just-released 2016 Cisco Annual Security Report (ASR) presents a challenging cybersecurity landscape: cyber defense teams are fighting to keep up with rapid global digitization while trying to integrate dozens of vendor solutions, speed up detection, and educate their organizations from top to bottom. Meanwhile attackers grow more bold, flexible, and resilient by the day, setting up professional infrastructures that look a lot like what we’d find in legitimate businesses. On the global front, we see fluctuations in cyber Internet governance across regions, which []

Source:: Cisco Security Notice

Internet Explorer – Supportauslauf

Internet Explorer – Supportauslauf

Es ist mal wieder soweit: Der Support für einige ältere Versionen des Microsoft Internet-Explorer ist beendet. Das bedeutet die erhebliche Erhöhung des Risikos für den Anwender, denn der Webbrowser hat sich als massives Angriffsziel für Schädlinge längst etabliert. Insofern ist dringend empfohlen, auf die jeweils aktuellste, für das eigene System verfügbare, Version umzusteigen, damit auch weiterhin Sicherheitsupdates verfügbar sind. Microsoft hat diese Liste zu den Versionen veröffentlicht.

Selbst wenn der Internet Explorer nicht der verwendete Standard-Browser ist, sollte das Update erfolgen, da es eine enge Verzahnung mit dem Wirtssystem gibt.

Dazu empfehlen wir auch die Lektüre bei heise Security.

 

Research Spotlight: Needles in a Haystack

By Talos Group This post was authored by Mariano Graziano . Malware sandboxes are automated dynamic analysis systems that execute programs in a controlled environment. Within the large volumes of samples submitted daily to these services, some submissions appear to be different from others and show interesting characteristics. At USENIX Security 2015 I presented a paper in which we proposed a method to automatically discover malware developments from samples submitted to online dynamic analysis systems. The research was conducted by dissecting the Anubis sandbox dataset which consisted of over 30M []

Source:: Cisco Security Notice

Research Spotlight: Needles in a Haystack

By Talos Group This post was authored by Mariano Graziano . Malware sandboxes are automated dynamic analysis systems that execute programs in a controlled environment. Within the large volumes of samples submitted daily to these services, some submissions appear to be different from others and show interesting characteristics. At USENIX Security 2015 I presented a paper in which we proposed a method to automatically discover malware developments from samples submitted to online dynamic analysis systems. The research was conducted by dissecting the Anubis sandbox dataset which consisted of over 30M []

Source:: Cisco Security Notice