Tackling the Threat Landscape with Innovative Partnerships

By Anthony Grieco As countries digitize to expand economic growth, promote a secure environment for investment, job creation and global competitiveness, cyber attackers are also seeing the monetary and political opportunity to exploit digital expansion and its data to their advantage. The dynamic threat landscape is not a challenge to be solved by one organization, one product, or […]

Source:: Cisco Security Notice

End of Sales für Windows Server 2012R2

Mit dem Jahresende 2017 wird auch der Verkauf von Microsoft Windows Server 2012R2 enden. Auch wenn seit der Einführung von Server 2016 eigentlich keine Notwendigkeit mehr besteht, die Vorgängerversion einzusetzen, liegt der Anteil von Server 2012R2 bei Standardkunden immer noch bei etwa 50% aller neu lizensierten Serversysteme.

Unsere Empfehlung: Sofern Sie unbedingt die Version 2012R2 einsetzen möchten, lizensieren Sie Server 2016 und nutzen Sie das Downgrade-Recht auf Version 2012R2. Der Vorteil dabei ist, dass Sie vorhandene WS2012CALs weiter nutzen können und den Kauf von WS2016CALs vertagen dürfen.

Mehr zur Lizenzthematik von Microsoft Windows Server erfahren Sie bei uns:

DSC_2012 klein
Frank Erlinghagen
02261 9155055
erlinghagen@oberberg.net
DSC_2022 klein
Jörg Wegner
02261 9155052
wegner@oberberg.net
Daniel Wenzlau
02261 9155054
wenzlau@oberberg.net

Perspective About the Recent WPA Vulnerabilities

By Omar Santos On October 16th,Mathy Vanhoef and Frank Piessens, from the University of Leuven, published a paper disclosing a series of vulnerabilities that affect the Wi-Fi Protected Access (WPA) and the Wi-Fi Protected Access II (WPA2) protocols. These are protocol-level vulnerabilities that affect wireless vendors providing infrastructure devices and wireless clients, which follow the WPA and WPA2 […]

Source:: Cisco Security Notice

Perspective About the Recent WPA Vulnerabilities

By Omar Santos On October 16th,Mathy Vanhoef and Frank Piessens, from the University of Leuven, published a paper disclosing a series of vulnerabilities that affect the Wi-Fi Protected Access (WPA) and the Wi-Fi Protected Access II (WPA2) protocols. These are protocol-level vulnerabilities that affect wireless vendors providing infrastructure devices and wireless clients, which follow the WPA and WPA2 […]

Source:: Cisco Security Notice

Threat Round Up for Oct 6 – Oct 13

By Talos Group Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between October 6 and October 13. As with previous round-ups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavior characteristics, indicators of compromise, and how our customers are automatically […]

Source:: Cisco Security Notice

Threat Round Up for Oct 6 – Oct 13

By Talos Group Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between October 6 and October 13. As with previous round-ups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavior characteristics, indicators of compromise, and how our customers are automatically […]

Source:: Cisco Security Notice

Cybersecurity is Everyone’s Responsibility: 5 ways to turbo charge your security practices

By Scott Garrett This post was authored by Scott Garrett, GSSO, Cisco and Matt Gyde, Group Executive Security, Dimension Data. The speed at which we operate in a mobile world can result in risky user behaviors that threat actors are taking advantage of in order to breach information. Attackers are targeting the human element of digital IT through […]

Source:: Cisco Security Notice

Cybersecurity is Everyone’s Responsibility: 5 ways to turbo charge your security practices

By Scott Garrett This post was authored by Scott Garrett, GSSO, Cisco and Matt Gyde, Group Executive Security, Dimension Data. The speed at which we operate in a mobile world can result in risky user behaviors that threat actors are taking advantage of in order to breach information. Attackers are targeting the human element of digital IT through […]

Source:: Cisco Security Notice