By Panos Kampanakis We have blogged about post-quantum cryptography before. Quantum computers would pose a threat to PKI algorithms and systems that we know today. Cisco, with our academic collaborators, has been

Source:: Cisco Security Notice

By Talos Group Overview Talos is disclosing five vulnerabilities in Foxit PDF Reader. Foxit PDF Reader is a popular free program for viewing, creating,

Source:: Cisco Security Notice

By Talos Group Overview Talos is disclosing five vulnerabilities in Foxit PDF Reader. Foxit PDF Reader is a popular free program for viewing, creating,

Source:: Cisco Security Notice

By Talos Group This blog post was authored by Jonas Zaddach and Mariano Graziano. Cisco Talos has rolled out a series of improvements to the BASS open-source framework aimed at speeding

Source:: Cisco Security Notice

By Talos Group This blog post was authored by Jonas Zaddach and Mariano Graziano. Cisco Talos has rolled out a series of improvements to the BASS open-source framework aimed at speeding

Source:: Cisco Security Notice

Oberberg-Online setzt auch weiter auf das Thema Schulen und Bildung. Neben Notebooks, Tablets, PCs, Servern und WLAN-Infrastrukturen, bekommen Schulen bei uns auch weiterhin preiswerte G DATA und Microsoft-Lösungen zum Sonderpreis für Bildungseinrichtungen.

Für viele Schulen in den umliegenden Landkreisen bieten wir auch IT-Serviceleistungen an, um die Verwaltungs- und Schulnetze zuverlässig und sicher zu betreiben.

Mit unserer Rezertifizierung bei Microsoft unterstreichen wir erneut, dass Oberberg-Online der verlässliche Partner für Schulen und Verwaltungen ist.

Ihre Ansprechpartner zum Thema Schule und Verwaltung:

DSC_2022 klein
Jörg Wegner
02261 9155052
wegner@oberberg.net
DSC_2012 klein
Frank Erlinghagen
02261 9155055
erlinghagen@oberberg.net
Daniel Wenzlau
02261 9155054
wenzlau@oberberg.net

By Neil Patel In the hyper-competitive world of endpoints security, proof of efficacy is the only real impartial way to valuably differentiate. However, public testing for next generation endpoint security solutions such as

Source:: Cisco Security Notice

By Neil Patel In the hyper-competitive world of endpoints security, proof of efficacy is the only real impartial way to valuably differentiate. However, public testing for next generation endpoint security solutions such as

Source:: Cisco Security Notice