Security and the Board

By Stuart Broderick Not long ago I was asked to attend a quarterly Board meeting of one of my healthcare clients and to present the recommendations of a Strategic Security Roadmap (SSR) exercise that my team and I had conducted for the organization. The meeting commenced sharply at 6am one weekday morning and I was allocated the last ten minutes to explain our recommendations and proposed structure for a revised Cybersecurity Management Program (CMP). The client Director of Security and I waited patiently []

Source:: Cisco Security Notice

Security and the Board

By Stuart Broderick Not long ago I was asked to attend a quarterly Board meeting of one of my healthcare clients and to present the recommendations of a Strategic Security Roadmap (SSR) exercise that my team and I had conducted for the organization. The meeting commenced sharply at 6am one weekday morning and I was allocated the last ten minutes to explain our recommendations and proposed structure for a revised Cybersecurity Management Program (CMP). The client Director of Security and I waited patiently []

Source:: Cisco Security Notice

Fit für die All-IP Umstellung – Oberberg-Online Techniker rezertifiziert

Fit für die All-IP Umstellung – Oberberg-Online Techniker rezertifiziert

Seit 2003 ist Oberberg-Online offizieller Innovaphone Authorized Reseller (IAR). Das bedeutet, dass neben der Zertifizierung der kaufmännischen Mitarbeiter auch Techniker des Unternehmens sowohl Trainings beim Hersteller selbst, als auch regelmäßige zwei-wöchige Update-Schulungen absolvieren und sich einer strengen Prüfung unterziehen müssen.

Wir freuen uns darüber, dass Sebastian Lutz und Marcus Schultes frisch gebackene Innovaphone V11 Engineers sind und gratulieren ganz herzlich.

Was haben unsere Kunden davon? Ganz einfach. Beide sind Experten, um Sie bei der Umstellung auf All-IP zu begleiten und zu unterstützen. Die Deutsche Telekom stellt bis 2018 alle bisherigen Anschlüsse (ISDN) auf die neue IP-Plattform um. Das bedeutet, dass Sie möglicherweise vor dem Problem stehen, Ihre alte Telefonanlage umzustellen, ec-cash-Geräte, Fax oder Frankiermaschinen für das neue Netz fit zu machen. Da bei einem Teil unserer Kunden diese Umstellung seitens der Telekom bereits erfolgte, können wir Ihnen mit ganz konkreten Erfahrungen aus der Praxis helfen, diesen Vorgang so sanft wie möglich durchzuführen.

Aber neben dem Umstellungsaufwand bietet All-IP auch spannende, neue Möglichkeiten der Integration von Festnetz, Mobilfunk und EDV-Welt. Gerne zeigen wir Ihnen live, was mit der neuen Innovaphone PBX V11 Ihren Arbeitsalltag erleichtert.

 

Wir freuen uns auf Ihre Terminwünsche unter 02261 / 9155050 oder vertrieb@oberberg.net


DSC_2043 kleinice_V11_Update_logoDSC_4008

Creating an Intelligence-Led Security Organization

By Joe Malenfant I recently had the opportunity to sit down with Roland Cloutier, Global Chief Security Officer at ADP and former CISO at EMC, to discuss how they integrate and leverage threat intelligence into their security operations centers as well as their greater security technology infrastructure. It’s pretty rare for the CISO of a F500 company to discuss what technologies they use in such an open way, but it was really a testament to the trust they have for the solutions they []

Source:: Cisco Security Notice

Creating an Intelligence-Led Security Organization

By Joe Malenfant I recently had the opportunity to sit down with Roland Cloutier, Global Chief Security Officer at ADP and former CISO at EMC, to discuss how they integrate and leverage threat intelligence into their security operations centers as well as their greater security technology infrastructure. It’s pretty rare for the CISO of a F500 company to discuss what technologies they use in such an open way, but it was really a testament to the trust they have for the solutions they []

Source:: Cisco Security Notice

Application Software Under the Scanner — Splunk, NQ Mobile, Fortinet, Paycom Software, and Cornerstone OnDemand

Application Software Under the Scanner — Splunk, NQ Mobile, Fortinet, Paycom Software, and Cornerstone OnDemand

Source:: Fortinet

Application Software Under the Scanner — Splunk, NQ Mobile, Fortinet, Paycom Software, and Cornerstone OnDemand

Application Software Under the Scanner — Splunk, NQ Mobile, Fortinet, Paycom Software, and Cornerstone OnDemand

Source:: Fortinet

Fortinet Selected to Secure Black Hat USA, the World’s Premiere Information Security Conference

Fortinet Selected to Secure Black Hat USA, the World’s Premiere Information Security Conference

Source:: Fortinet

Fortinet Selected to Secure Black Hat USA, the World’s Premiere Information Security Conference

Fortinet Selected to Secure Black Hat USA, the World’s Premiere Information Security Conference

Source:: Fortinet

Vulnerability Spotlight: Total Commander FileInfo Plugin Denial of Service

By Talos Group Talos is releasing an advisory for multiple vulnerabilities that have been found within the Total Commander FileInfo Plugin. These vulnerabilities are local denial of service flaws and have been assigned CVE-2015-2869. In accordance with our Vendor Vulnerability Reporting and Disclosure policy, these vulnerabilities have been disclosed to the plugin author(s) and CERT. This post serves as a summary of the advisory. Credit for these discoveries belongs to Marcin Noga of Talos. TALOS-2015-024/CVE-2015-2869 An attacker who controls the content of a COFF Archive Library []

Source:: Cisco Security Notice