Overcoming the DNS “Blind Spot”

By John Stuppi [ed. note – this post was authored jointly by John Stuppi and Dan Hubbard ] The Domain Name Service (DNS) provides the IP addresses of intended domain names in response to queries from requesting end hosts. Because many threat actors today are leveraging DNS to compromise end hosts monitoring DNS is often a critical step in identifying and containing malware infections and investigating attacks. Yet our research found that few organizations actually monitor DNS for security purposes—or at all—which makes DNS a security “blind []

Source:: Cisco Security Notice

Overcoming the DNS “Blind Spot”

By John Stuppi [ed. note – this post was authored jointly by John Stuppi and Dan Hubbard ] The Domain Name Service (DNS) provides the IP addresses of intended domain names in response to queries from requesting end hosts. Because many threat actors today are leveraging DNS to compromise end hosts monitoring DNS is often a critical step in identifying and containing malware infections and investigating attacks. Yet our research found that few organizations actually monitor DNS for security purposes—or at all—which makes DNS a security “blind []

Source:: Cisco Security Notice

Why Aging Infrastructure Is a Growing Problem

By Anthony Grieco Defending a network against threats of growing complexity requires a mix of technology and policies that are as sophisticated as the campaigns created by attackers. A necessary component to an efffective defense includes tackling the low-hanging fruit—that is, basic tasks such as patching vulnerabilities and updating old software. However, as we relate in the Cisco 2016 Annual Security Report too many organizations are relying on seriously outdated network components and operating systems—thus providing even more opportunity for adversaries to infiltrate or attack their network. As []

Source:: Cisco Security Notice

Why Aging Infrastructure Is a Growing Problem

By Anthony Grieco Defending a network against threats of growing complexity requires a mix of technology and policies that are as sophisticated as the campaigns created by attackers. A necessary component to an efffective defense includes tackling the low-hanging fruit—that is, basic tasks such as patching vulnerabilities and updating old software. However, as we relate in the Cisco 2016 Annual Security Report too many organizations are relying on seriously outdated network components and operating systems—thus providing even more opportunity for adversaries to infiltrate or attack their network. As []

Source:: Cisco Security Notice

Fujitsu PRIMERGY Sonderaktion CAL4Free

Fujitsu PRIMERGY Sonderaktion CAL4Free

Bis zum 31.01.2016 gilt die Sonderaktion unseres Technologiepartners Fujitsu. Zu einem qualifizierten Bundle aus einem Fujitsu PRIMERGY Servers (VFY, sprechen Sie mit uns über das für Sie passende Modell) und einer Microsoft Windows Server Lizenz erhalten Sie kostenfreie Windows Server CAL Lizenzen. Im Einzelnen sind das 5 freie CALs beim Erwerb von Windows Server Standard und 20 freie CALs beim Erwerb der Data Center Version.

Lassen Sie uns über Ihr Einsatzszenario sprechen und die passende Variante finden. Ihren Termin vereinbaren Sie ganz leicht unter 02261 915500 oder mit einer Mail an vertrieb@oberberg.net

 

The Value of Collaboration in Weakening Attackers

By Craig Williams Today’s attackers deploy complex and clever threats that are difficult to combat with just one method of defense. In some cases, defenders must go beyond tools for detecting attacks and devise a different approach for obstructing our adversaries‘ ability to operate.
As detailed in the Cisco 2016 Annual Security Report

Source:: Cisco Security Notice

The Value of Collaboration in Weakening Attackers

By Craig Williams Today’s attackers deploy complex and clever threats that are difficult to combat with just one method of defense. In some cases, defenders must go beyond tools for detecting attacks and devise a different approach for obstructing our adversaries‘ ability to operate.
As detailed in the Cisco 2016 Annual Security Report

Source:: Cisco Security Notice

Forewarned Is Forearmed: Announcing the 2016 Cisco Annual Security Report

By John Stewart Our just-released 2016 Cisco Annual Security Report (ASR) presents a challenging cybersecurity landscape: cyber defense teams are fighting to keep up with rapid global digitization while trying to integrate dozens of vendor solutions, speed up detection, and educate their organizations from top to bottom. Meanwhile attackers grow more bold, flexible, and resilient by the day, setting up professional infrastructures that look a lot like what we’d find in legitimate businesses. On the global front, we see fluctuations in cyber Internet governance across regions, which []

Source:: Cisco Security Notice

Forewarned Is Forearmed: Announcing the 2016 Cisco Annual Security Report

By John Stewart Our just-released 2016 Cisco Annual Security Report (ASR) presents a challenging cybersecurity landscape: cyber defense teams are fighting to keep up with rapid global digitization while trying to integrate dozens of vendor solutions, speed up detection, and educate their organizations from top to bottom. Meanwhile attackers grow more bold, flexible, and resilient by the day, setting up professional infrastructures that look a lot like what we’d find in legitimate businesses. On the global front, we see fluctuations in cyber Internet governance across regions, which []

Source:: Cisco Security Notice

Internet Explorer – Supportauslauf

Internet Explorer – Supportauslauf

Es ist mal wieder soweit: Der Support für einige ältere Versionen des Microsoft Internet-Explorer ist beendet. Das bedeutet die erhebliche Erhöhung des Risikos für den Anwender, denn der Webbrowser hat sich als massives Angriffsziel für Schädlinge längst etabliert. Insofern ist dringend empfohlen, auf die jeweils aktuellste, für das eigene System verfügbare, Version umzusteigen, damit auch weiterhin Sicherheitsupdates verfügbar sind. Microsoft hat diese Liste zu den Versionen veröffentlicht.

Selbst wenn der Internet Explorer nicht der verwendete Standard-Browser ist, sollte das Update erfolgen, da es eine enge Verzahnung mit dem Wirtssystem gibt.

Dazu empfehlen wir auch die Lektüre bei heise Security.