By Anthony Grieco Cisco has been working to draw attention to the hidden security risks organizations face by not properly maintaining their aging infrastructure and patching vulnerable systems. Threat actors, including ransomware operators, are using vulnerable Internet infrastructure as a foothold to launch their campaigns. The trends lead us to believe we should expect to see more of […]

Source:: Cisco Security Notice

By John N. Stewart I have an incredible team, and we achieve incredible things together. It’s rewarding to see each and every one of them succeed, and for that success to be realized externally. Today, I’m proud to share that the 2016 Golden Bridge Business and Innovation Awards recognized three members of our Cisco Security and Trust Organization for their […]

Source:: Cisco Security Notice

By John N. Stewart I have an incredible team, and we achieve incredible things together. It’s rewarding to see each and every one of them succeed, and for that success to be realized externally. Today, I’m proud to share that the 2016 Golden Bridge Business and Innovation Awards recognized three members of our Cisco Security and Trust Organization for their […]

Source:: Cisco Security Notice

By Talos Group This post was authored by Edmund Brumaghin and Jonah Samost Today is Patch Tuesday for August 2016, and Microsoft has released several security bulletins and associated patches to resolve security issues across their products. This month’s patch release includes 9 bulletins addressing 28 vulnerabilities. Five of the bulletins Microsoft has released are rated Critical and […]

Source:: Cisco Security Notice

By Talos Group This post was authored by Edmund Brumaghin and Jonah Samost Today is Patch Tuesday for August 2016, and Microsoft has released several security bulletins and associated patches to resolve security issues across their products. This month’s patch release includes 9 bulletins addressing 28 vulnerabilities. Five of the bulletins Microsoft has released are rated Critical and […]

Source:: Cisco Security Notice

By Sean Mason IT departments regularly ask us questions about their security posture, their security concerns, and specifically, the makeup of their Threat Management (TM) organizations. Generally speaking, Threat Management includes anything in the Intel-Detection-Response arena, generally encompassing Security Operations Centers, Intelligence Organizations, and Incident Response Teams. When it comes to the makeup of their TM organizations, companies […]

Source:: Cisco Security Notice

By Sean Mason IT departments regularly ask us questions about their security posture, their security concerns, and specifically, the makeup of their Threat Management (TM) organizations. Generally speaking, Threat Management includes anything in the Intel-Detection-Response arena, generally encompassing Security Operations Centers, Intelligence Organizations, and Incident Response Teams. When it comes to the makeup of their TM organizations, companies […]

Source:: Cisco Security Notice

Windows 7 bald nicht mehr vorinstalliert erhältlich

Alle PC-Hersteller dürfen nur noch bis zum 31.10.2016 Client-Systeme mit vorinstalliertem Windows 7 Betriebssystem ausliefern. Um die Verfügbarkeit bis zum 31.10.2016 sicherzustellen, können wir Ihre Orders für FUJITSU-PCs und Notebooks verbindlich nur noch bis zum 30.09.2016 entgegennehmen. Danach gilt die Lieferbarkeit lediglich noch für verfügbare Lagerware beim Distributor.

FUJITSU Produkte unterstützen aber auch über den 31.10.2016 hinaus vollumfänglich Windows 7 – das gilt sowohl für Hardware, als auch Treiber.

Fragen zur Verfügbarkeit und Ihre Aufträge nehmen gerne entgegen:

DSC_2022 klein
Jörg Wegner
02261 9155052
wegner@oberberg.net
DSC_2012 klein
Frank Erlinghagen
02261 9155055
erlinghagen@oberberg.net
Daniel Wenzlau
02261 9155054
wenzlau@oberberg.net

By Eric Hulse This is the first in a series of blogs about advanced malware Behavioral Indicators Morph Over Time A large part of Threat Grid’s efficacy in determining the nature of a submitted file is through the use of over 675 indicators to identify malware. The initial indicators created for AMP Threat Grid sought to identify strictly […]

Source:: Cisco Security Notice

By Eric Hulse This is the first in a series of blogs about advanced malware Behavioral Indicators Morph Over Time A large part of Threat Grid’s efficacy in determining the nature of a submitted file is through the use of over 675 indicators to identify malware. The initial indicators created for AMP Threat Grid sought to identify strictly […]

Source:: Cisco Security Notice