Verhalten bei IT-Notfällen
Oberberg-Online ist als Mitglied der Allianz für Cybersicherheit permanent an der Verbesserung der IT-Sicherheit seiner Kunden interessiert. In diesem Zusammenhang greifen wir heute ein Thema des BSI auf und stellen diese Informationen hier gesammelt zur Verfügung. Wichtig ist im Falle eines Falles das korrekte Verhalten der Mitarbeiter bei IT-Notfällen. Damit sollen Schäden minimiert werden und […]
Malvertising
By Ben Nahorney Online advertising is an integral part of today’s internet experience. In many ways, ads are the lifeblood behind many websites, providing the necessary funding to keep sites running, as well as supporting the creation of new content. While it may appear as though the ads that are displayed are just a component […]
Why We Must Get Data Privacy Right
By Robert Waitman As consumers the world over gear up for the holiday shopping season, and with Black Friday and Cyber Monday soon upon us here in the US, global consumers will be purchasing online more than ever before. In fact, global e-commerce sales are projected to be more than $140 billion over the holidays, […]
IP-Telefone für Einsteiger
Sie suchen ein IP-Einsteigertelefon und möchten trotzdem nicht auf beste Sprachqualität und moderne Sicherheitsprotokolle verzichten? Unser Partner innovaphone produziert in Deutschland die beiden Modelle IP101 und IP102. Diese eignen sich bestens dafür, sind zudem ideal im Einsatz für klassische Telefonie und unterscheiden sich lediglich durch eine USB-Schnittstelle für Headsets und einen Gigabit- bzw. Fast-Ethernet-Anschluss. Die […]
The Importance of the Network in Detecting Incidents in Critical Infrastructure
By Simon Finn As we saw in my last blog, the network plays a key role in defending critical infrastructure and IoT. The devices that we are connecting drive our business, enabling us to make smarter decisions and gain greater efficiency through digitization. But how do we ensure those connected devices are acting as intended? […]
Finding the malicious needles in your endpoint haystacks
By Samuel Brown Accelerate Threat Hunts and Investigations with Pre-Curated Complex Queries Security teams often lack the ability to gain deep visibility into the state of all their endpoints in real time. Even with a bevy of tools at their fingertips, once an incident occurs, conducting investigations can be likened to searching for a needle […]
Welcome to the New Zero Trust
By Thu T. Pham Complexity, opacity and the gatekeeping of knowledge are tactics often used to appear sophisticated or intelligent. They can also be used to intimidate. In security and technology, complexity can lead to critical gaps in visibility and an extended attack surface – with too many vendors and solutions to interconnect and manage. […]