pxGrid Keeps Growing

By Andrew Peters With ten new partners you know it’s not an illusion Do you remember that magic trick with the metal rings that seem linked together? The magician pulls and an audience member pulls and the rings seem to be solid – forming an unbreakable chain. But with sleight of hand they come apart. […]

FUJITSU Aktionsmodelle im Juni 2016

Nachdem wir in der vergangenen Woche 10 gute Gründe für FUJITSU Primergy Server genannt haben, kommen hier natürlich auch die Aktionsmodelle zu Angebotskonditionen: Server und Storage finden Sie hier. Selbstverständlich gibt es auch für die Bereiche Notebooks, Tablets und Co., sowie für die stationären PCs wieder Monatsangebote.   Wir freuen uns auf Ihre Anfragen: Frank […]

Microsoft Patch Tuesday – June 2016

By Talos Group This post was authored by Warren Mercer. Patch Tuesday for June 2016 has arrived where Microsoft releases their monthly set of security bulletins designed to address security vulnerabilities within their products. This month’s release contains 16 bulletins addressing 44 vulnerabilities. Five bulletins resolve critical vulnerabilities found in MS DNS Server, Edge, Internet […]

Microsoft Patch Tuesday – June 2016

By Talos Group This post was authored by Warren Mercer. Patch Tuesday for June 2016 has arrived where Microsoft releases their monthly set of security bulletins designed to address security vulnerabilities within their products. This month’s release contains 16 bulletins addressing 44 vulnerabilities. Five bulletins resolve critical vulnerabilities found in MS DNS Server, Edge, Internet […]

Advanced Malware Evasion Techniques HTTP-Evader

By John Klimarchuk Malware doesn’t play by the rules, so today’s IT infrastructure needs to provide several layers of defense for end-users. Some of the more common devices used to protect modern networks are Intrusion Prevention systems (IPS) and Firewalls. In recent years, there has been a lot of research on how evasion techniques bypass […]

Advanced Malware Evasion Techniques HTTP-Evader

By John Klimarchuk Malware doesn’t play by the rules, so today’s IT infrastructure needs to provide several layers of defense for end-users. Some of the more common devices used to protect modern networks are Intrusion Prevention systems (IPS) and Firewalls. In recent years, there has been a lot of research on how evasion techniques bypass […]

Planes, trains, and automobiles – if it’s on your network, Cisco ISE can see it

By Dan Stotts Planes, trains, and automobiles – if it’s on your network, Cisco ISE can see it in minutes and control its access dynamically at scale. Networks are increasingly distributed and more devices are connecting to your network every day. Research finds that 300 billion devices will be connected to the Internet by 2030, […]