Why Business Leaders Should Care About Quantum Computing
By Stacy Cannady Here’s the bottom line: Quantum computing is a threat to cybersecurity, but it’s not an imminent threat. Source:: Cisco Security Notice
Cisco Job Posting Targets Korean Candidates
By Talos Group Edmund Brumaghin and Paul Rascagneres authored this post, with contributions from Jungsoo An. Executive summary Cisco Talos recently observed a targeted malware campaign being leveraged in an… Source:: Cisco Security Notice
Vulnerability Spotlight: Multiple vulnerabilities in ACD Systems Canvas Draw 5
By Talos Group Cisco Talos is disclosing several vulnerabilities in ACD Systems‘ Canvas Draw 5, a graphics-editing tool for Mac. The vulnerable component of Canvas Draw 5 lies in the handling of TIFF… Source:: Cisco Security Notice
It’s 9am. Do you know where your data is?
By Bobby Guhasarkar ‘Data center anywhere‘ requires security everywhere – Bobby Guhasarkar, January 29, 2019 It’s 9am. Do you know where your data is? If you’re like most businesses today, it’s everywhere…. Source:: Cisco Security Notice
Neue Preise bei Innovaphone ab dem 15.02.2019
Neue Preise bei Innovaphone ab dem 15.02.2019 Jetzt noch schnell zum alten Preis bestellen und sparen. Zum 15.02.2019 gilt die neue Preisliste unseres Hersteller-Partners Innovaphone. Sprechen Sie mit uns und statten Sie Ihr Unternehmen noch zu den aktuellen Konditionen aus: Marcus Schultes schultes@oberberg.net Jörg Wegner 02261 9155052 wegner@oberberg.net Dirk Zurawski 02261 9155051 zurawski@oberberg.net
Vulnerability Spotlight: Multiple WIBU SYSTEMS WubiKey vulnerabilities
By Talos Group Marcin „Icewall“ Noga of Cisco Talos discovered these vulnerabilities. Executive Summary Cisco Talos discovered two vulnerabilities that could allow remote code execution and memory disclosure at the kernel level… Source:: Cisco Security Notice
New Year, Same Reality: How Much Will Security Actually Change in 2019
By Amanda Rogerson If we look back at the security landscape of 2018, there were some interesting highs and lows. There were a number of large-scale breaches and a few new regulatory controls for identity and data protection implemented. Given that there is so much attention on security in this digital age that must mean […]