Research Spotlight: ROPMEMU – A Framework for the Analysis of Complex Code Reuse Attacks

By Talos Group The post was authored by Mariano Graziano. Executive Summary Attacks have grown more and more complex over the years. The evolution of the threat landscape has demonstrated this where adversaries have had to modify their tactics to bypass mitigations and compromise systems in response to better mitigations. Code-reuse attacks, such as return-oriented programming (ROP), are […]

Source:: Cisco Security Notice

Research Spotlight: ROPMEMU – A Framework for the Analysis of Complex Code Reuse Attacks

By Talos Group The post was authored by Mariano Graziano. Executive Summary Attacks have grown more and more complex over the years. The evolution of the threat landscape has demonstrated this where adversaries have had to modify their tactics to bypass mitigations and compromise systems in response to better mitigations. Code-reuse attacks, such as return-oriented programming (ROP), are […]

Source:: Cisco Security Notice

Insiders: The often forgotten threat

By Mark Goudie Insider threats are of particular concern to organisations as the impact of a rogue insider can be catastrophic to the business. The 2016 Verizon Data Breach Investigations Report showed that 15% of data breaches were a direct result of insider deliberate or malicious behaviour. Given that it is not likely that all insider breaches are discovered […]

Source:: Cisco Security Notice

Insiders: The often forgotten threat

By Mark Goudie Insider threats are of particular concern to organisations as the impact of a rogue insider can be catastrophic to the business. The 2016 Verizon Data Breach Investigations Report showed that 15% of data breaches were a direct result of insider deliberate or malicious behaviour. Given that it is not likely that all insider breaches are discovered […]

Source:: Cisco Security Notice

Mobiler Arbeitsplatz – FUJITSU Tablet Stylistic R726

Die Frage, ob Sie mit einem klassischen Notebook oder einem eleganten Tablet produktiver arbeiten können, findet mit dem FUJITSU Tablet STYLISTIC R726 eine kompromisslose Antwort. Die neue 2-in-1- Kombination ist extrem flexibel, sekundenschnell wandlungsfähig und jederzeit und überall einsetzbar. Der aufwändige Wechsel zwischen mehreren Devices entfällt, und Ihr mobiles Business wird erheblich komfortabler und produktiver.

Stylistic R726-2
 

  • Die 6. Generation der Intel® Core™ Prozessoren sorgt für High-End-Performance.
  • Mit Windows 10 Pro als Standardbetriebssystem ermöglicht Fujitsu Unternehmen eine einfache Einbindung in Ihre IT-Infrastruktur.
  • Sie haben die Wahl zwischen 10-Finger-Touchpad, stiftbasierter Eingabe und magnetischem Keyboard – entsprechend Ihrer Anforderungen in den unterschiedlichsten Einsatzszenarien.
  • Glare- oder Anti-Glare-Display mit großer 31,8 cm (12,5″) Bildschirmdiagonale.
  • Lange Akkulaufzeit mit bis zu 12 Stunden Power, auch wenn das Display kontinuierlich genutzt wird.
  • Elegantes, robustes Aluminiumgehäuse
  • Integrierte, schnelle 4G/LTE-Connectivity
  • Modernste Sicherheitsfeatures wie verschlüsselte Festplatten, TPM- und NFC-basierte drahtlose SmartCard-Authentifikation.

Erhältlich bei Ihrem FUJITSU Select Expert Partner Oberberg-Online.

DSC_2012 klein
Frank Erlinghagen
02261 9155055
erlinghagen@oberberg.net
DSC_2022 klein
Jörg Wegner
02261 9155052;
wegner@oberberg.net
Daniel Wenzlau
02261 9155054
wenzlau@oberberg.net

Oberberg-Online … und es läuft!

Oberberg-Online … und es läuft!

Der KKH-Lauf 2016 in Köln war der Auftakt für das Oberberg-Online Lauf-Team … und das auch noch für einen guten Zweck, denn der Veranstalter unterstützt mit allen Start- und Spendengeldern die Aktion Ein Herz für Kinder e.V.

Dabei kamen seit dem Jahr 2004 bereits über eine Million Euro zusammen. Insgesamt 175.000 Aktive und mehr als 1 Million Zuschauer zeugen von der Attraktivität der Veranstaltungsreihe.

Unser Team pflegt mit gemeinsamen Aktivitäten auch den Zusammenhalt nach Feierabend. Schließlich verbringen wir mehr gemeinsame Zeit auf der Arbeit, als mit der Familie zu Hause – und wenn die Chemie dabei stimmt, fällt die Arbeit leicht und macht auch noch Spaß. Und das merken hoffentlich auch Sie als unsere Kunden.

IMG_4930 IMG_4934 IMG_4938 IMG_4939

 

Simplifying end-to-end security with SAFE

By Christian Janoff End-to-end security tends to be very abstract and difficult for humans to visualize. The challenges of designing, building and maintaining networks with security across every business case and each part of your network is no simple task. It requires that you know why you are building the network from a business perspective, and then, how […]

Source:: Cisco Security Notice

Simplifying end-to-end security with SAFE

By Christian Janoff End-to-end security tends to be very abstract and difficult for humans to visualize. The challenges of designing, building and maintaining networks with security across every business case and each part of your network is no simple task. It requires that you know why you are building the network from a business perspective, and then, how […]

Source:: Cisco Security Notice

The Second Law of IoT: Not All “Things” that Can Be Connected Should Be Connected

By Eric Wenger In Part One of this Cybersecurity for IoT Blog Series, I noted that we should assume that everything will someday be connected—even those “things” designed without any networking capability. However, we should also be deliberate when deciding what to attach and what to isolate. When a link is established, we should know not only that […]

Source:: Cisco Security Notice

The Second Law of IoT: Not All “Things” that Can Be Connected Should Be Connected

By Eric Wenger In Part One of this Cybersecurity for IoT Blog Series, I noted that we should assume that everything will someday be connected—even those “things” designed without any networking capability. However, we should also be deliberate when deciding what to attach and what to isolate. When a link is established, we should know not only that […]

Source:: Cisco Security Notice