UPDATE: Die Notebook-Alternative für das Home-Office
Wir haben sie, die Notebook-Alternative für das Home-Office. UPDATE 26.03.2020: Fragen Sie uns nach aktuellen restlichen Verfügbarkeiten für Business-Notebooks. Kleine Chargen sind aktuell verfügbar. Aktuell haben viele Unternehmen und öffentliche Auftraggeber Probleme, ihr Personal mit Notebooks auszustatten. Damit steht die gewünschte Verlagerung ins Home-Office nicht zur Verfügung. Die Liefersituation ist aktuell bei einer […]
Security’s Vicious Cycle
By Barry Fisher When I booked a family vacation recently, I was reminded of the simplicity of travel planning these days. Hop on a platform like Expedia, enter your destination and travel timeline, and in just a few minutes and with a few clicks, you’re all set to jet off to any exotic location your […]
O.NET Notfallplan erfolgreich getestet
In der aktuellen Situation erhalten wir viele Anfragen dazu, wie wir bei Oberberg-Online einen reibungslosen Betrieb für unsere Kunden gewährleisten. Selbstverständlich existieren in unserem Hause Notfallpläne. Unser Pandemie-Notfallplan wurde bereits einem Live-Test unterzogen und für gut befunden. Wir arbeiten mit unterschiedlichen Teams, die getrennt voneinander in der Zentrale und den mobilen Offices tätig sind. Gesicherte […]
Launching today: Security Stories podcast
By Hazel Burton Welcome to the first ever episode of Security Stories! Security Stories is a brand new podcast from the Cisco Security team in which we discuss the past, present and future of cybersecurity. The podcast is mainly interview based, and we have some absolutely amazing people lined up to share their security stories […]
Threat Roundup for March 6 to March 13
By Talos Group Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Mar 6 and Mar 13. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how […]
How to Defend Against Command-and-Control attacks: Don’t let your network turn into a Zombie
By Sana Yousuf Your network is increasingly targeted by cybercriminals. One of the most clever and damaging way they strike is through command and control attacks – a technique often executed over DNS. A command-and-control (also referred to as C&C or C2) server is an endpoint compromised and controlled by an attacker. Devices on your […]
Women at Cisco take on the Cyberstart Challenge – Will You?
By Michele Guel Last fall, close to a one hundred Cisco women across the globe participated in the CyberStart Challenge. Cisco is the first public company to test the platform, which involves solving a series of cybersecurity challenges with increasing levels of complexity. There are three verticals, called “Bases”), 29 levels, and 236 challenges covering […]