Produktiv bleiben im Home-Office

Produktiv bleiben im Home-Office. Oder im normalen Büro. Ganz egal wo, mit unserem FUJITSU Leasingangebot erhalten Sie einen vollwertigen Arbeitsplatz inklusive Microsoft Windows 10 Pro für monatlich nur EURO 39,99 zzgl. MwSt.     Ihre Vorteile: fest kalkulierbare Kosten pro Arbeitsplatz mit dem 24 Zoll-Display deutlich größerer Arbeitsbereich, als mit jedem Notebook Mit einem Knopfdruck […]

PoetRAT Uses Covid-19 Lures To Attack Azerbajian

By Talos Group Cisco Talos has discovered a new malware campaign based on a previously unknown family we’re calling “PoetRAT.” At this time, we do not believe this attack is associated with an already known threat actor. Our research shows the malware was distributed using URLs that mimic some Azerbaijan government domains, thus we believe […]

Cisco Webex Tipps für Anwender

Oberberg-Online nutzt seit vielen Jahren die bewährte Cisco Webex Plattform, um mit Mitarbeitern im Home-Office, oder im Außeneinsatz in Verbindung zu bleiben. Mehr als 130 Millionen Anwender monatlich vertrauen Cisco Webex, um Meetings, Schulungen und Zusammenarbeit über Standort- und Unternehmensgrenzen hinweg unkompliziert, sicher und zuverlässig zu nutzen. Webex Meetings bietet integrierte Audio- und Videofunktionen sowie […]

Security Stories Episode 3: Protecting Democracy, and Learning How to Spot Online Manipulation Tactics with Theresa Payt …

By Hazel Burton With the job that I have, I’m incredibly lucky in that I get to meet some truly fascinating people. Most recently, I got to meet someone who I know is going to have a lasting impact on me for many years to come. That person is Theresa Payton, whom I interviewed for […]

How to Monitor VPN Split Tunneling and Remote Endpoints with Existing Infrastructure

By Scott Pope Using AnyConnect for VPN? Got Splunk? If so, you have what you need to secure, monitor and gain detailed endpoint visibility to: Implement VPN split tunneling to alleviate VPN capacity constraints without sacrificing security Monitor and further optimize traffic you put over your existing split tunnel deployment Analyze security behavior of remote […]

The Firewall: The foundation for a robust Security Platform

By Brian Remmel After many years of a strong preference for ‘best of breed‘ security tools, the tides are turning. There’s growing fatigue of the operational downsides – managing countless alerts and manually correlating threats, for example – inherent in this approach. Security products today need to include out-of-box integrations, interoperate with third–party solutions, share […]

5 Questions to Ask Your Security Platform Vendor

By Sana Yousuf CISO are always on the hunt for innovative solutions to solve their most pressing problems. They have been forced to choose their own adventure from an industry that’s rife with incompatibility, running their operations across dozens of tools and a plethora of consoles that don’t talk to each other. And this, combined […]