Vulnerability Spotlight: Apple Remote Code Execution With Image Files

By Talos Group Vulnerabilities discovered by Tyler Bohan of Cisco Talos. Many of the wide variety of file formats are designed for specialized uses within specific industries. Apple offers APIs as interfaces to provide a definitive way to access image data for multiple image formats on the Apple OS X platform. Talos is disclosing the […]

Vulnerability Spotlight: Apple Remote Code Execution With Image Files

By Talos Group Vulnerabilities discovered by Tyler Bohan of Cisco Talos. Many of the wide variety of file formats are designed for specialized uses within specific industries. Apple offers APIs as interfaces to provide a definitive way to access image data for multiple image formats on the Apple OS X platform. Talos is disclosing the […]

Steigen Sie um auf Sicherheit Made in Germany

Steigen Sie um auf Sicherheit Made in Germany Nutzen Sie jetzt das befristete Angebot unseres Technologiepartners G DATA und sichern Sie sich bis zum 30.09.2016 Neulizenzen zum Renewal-Preis. Sie haben ein Mitbewerber-Produkt im Einsatz, ziehen aber einen Wechsel zu IT-Sicherheit made in Germany in Betracht? Dann nutzen Sie die exklusive Crossgrade-Aktion von G DATA. So profitieren […]

Cisco Introduces Security Services for Digital Transformation

By Jon Stanford Around the world, organizations across all industry segments and markets are faced with the task of adopting digital technologies. Business leaders realize they must begin their digital transformation journey now, or risk fundamental business disruption and, potentially, business obsolescence. Unfortunately, many organizations are missing out because they lack a comprehensive and effective […]

Cisco Introduces Security Services for Digital Transformation

By Jon Stanford Around the world, organizations across all industry segments and markets are faced with the task of adopting digital technologies. Business leaders realize they must begin their digital transformation journey now, or risk fundamental business disruption and, potentially, business obsolescence. Unfortunately, many organizations are missing out because they lack a comprehensive and effective […]

Die Innovaphone PBX V12 ist ab sofort verfügbar

Die Innovaphone PBX V12 ist ab sofort verfügbar Die Beta-Phase ist beendet, ab sofort gibt es die Herstellerfreigabe für den Betrieb der neuen Telefonanlagen-Software in Version 12. Was ist neu? Sehen Sie hier die Highlights der neuen Version. Neben den umfangreichen Erweiterungen der Sicherheitsfunktionen, die gerade im Umfeld der All-IP Umstellung immer wichtiger werden, ist […]

Cisco Defense Orchestrator: The Security Policy Management “Easy Button”

By Player Pate Staying on top of security is hard, especially for network operations staff. If you’re like most of your peers, you probably have lots of devices, tons of policies and many locations and even cloud deployments to account for. Every time you need to change a policy, the complexity and time involved to […]