Why Business Leaders Should Care About Quantum Computing

By Stacy Cannady Here’s the bottom line: Quantum computing is a threat to cybersecurity, but it’s not an imminent threat. Source:: Cisco Security Notice

Cisco Job Posting Targets Korean Candidates

By Talos Group Edmund Brumaghin and Paul Rascagneres authored this post, with contributions from Jungsoo An. Executive summary Cisco Talos recently observed a targeted malware campaign being leveraged in an… Source:: Cisco Security Notice

Vulnerability Spotlight: Multiple vulnerabilities in ACD Systems Canvas Draw 5

By Talos Group Cisco Talos is disclosing several vulnerabilities in ACD Systems‘ Canvas Draw 5, a graphics-editing tool for Mac. The vulnerable component of Canvas Draw 5 lies in the handling of TIFF… Source:: Cisco Security Notice

It’s 9am. Do you know where your data is?

By Bobby Guhasarkar ‘Data center anywhere‘ requires security everywhere – Bobby Guhasarkar, January 29, 2019 It’s 9am. Do you know where your data is? If you’re like most businesses today, it’s everywhere…. Source:: Cisco Security Notice

Neue Preise bei Innovaphone ab dem 15.02.2019

Neue Preise bei Innovaphone ab dem 15.02.2019 Jetzt noch schnell zum alten Preis bestellen und sparen. Zum 15.02.2019 gilt die neue Preisliste unseres Hersteller-Partners Innovaphone. Sprechen Sie mit uns und statten Sie Ihr Unternehmen noch zu den aktuellen Konditionen aus: Marcus Schultes schultes@oberberg.net Jörg Wegner 02261 9155052 wegner@oberberg.net Dirk Zurawski 02261 9155051 zurawski@oberberg.net

Vulnerability Spotlight: Multiple WIBU SYSTEMS WubiKey vulnerabilities

By Talos Group Marcin „Icewall“ Noga of Cisco Talos discovered these vulnerabilities. Executive Summary Cisco Talos discovered two vulnerabilities that could allow remote code execution and memory disclosure at the kernel level… Source:: Cisco Security Notice

New Year, Same Reality: How Much Will Security Actually Change in 2019

By Amanda Rogerson If we look back at the security landscape of 2018, there were some interesting highs and lows. There were a number of large-scale breaches and a few new regulatory controls for identity and data protection implemented. Given that there is so much attention on security in this digital age that must mean […]