Vulnerability Spotlight: Code Execution Vulnerability in LabVIEW

By Talos Group LabVIEW is a system design and development platform released by National Instruments. The software is widely used to create applications for data acquisition, instrument control and industrial automation. Talos is disclosing the presence of a code execution vulnerability which can be triggered by opening specially crafted VI files, the proprietary file format used by LabVIEW. […]

Source:: Cisco Security Notice

Hardware mieten, statt zu kaufen

Hardware mieten, statt zu kaufen, das ist das Thema bei HaaS (Hardware as a Service), das wir gemeinsam mit unserem Partner FUJITSU anbieten.

In der IT ist nichts beständiger, als der stete und schnelle Wandel. Um darauf schnell und zuverlässig zu reagieren, ist die Miete der IT-Infrastruktur eine gute Lösung. Ob Notebooks, oder die komplette Serverfarm – unsere Hardware as a Service Angebote sind die passende Wahl.

Alle Geräte sind darüber hinaus über die vereinbarte Mietdauer gegen Schäden und Diebstahl versichert und stehen unter Service. Insbesondere das Ausfallrisiko wird durch eine Erneuerung im Dreijahresrhythmus minimiert.

Eine Kurzbroschüre mit Beispieldaten zum Thema haben wir hier für Sie bereitgestellt.

Mehr zu Ihrer individuellen Lösung erfahren Sie von uns:

DSC_2022 klein
Jörg Wegner
02261 9155052
wegner@oberberg.net
DSC_2012 klein
Frank Erlinghagen
02261 9155055
erlinghagen@oberberg.net
Daniel Wenzlau
02261 9155054
wenzlau@oberberg.net

Vulnerability Spotlight: Lexmark Perceptive Document Filters Code Execution Bugs

By Talos Group Overview Talos is disclosing a pair of code execution vulnerabilities in Lexmark Perceptive Document Filters. Perceptive Document Filters are a series of libraries that are used to parse massive amounts of different types of file formats for multiple purposes. Talos has previously discussed in detail these filters and how they operate. The software update to […]

Source:: Cisco Security Notice

Vulnerability Spotlight: Lexmark Perceptive Document Filters Code Execution Bugs

By Talos Group Overview Talos is disclosing a pair of code execution vulnerabilities in Lexmark Perceptive Document Filters. Perceptive Document Filters are a series of libraries that are used to parse massive amounts of different types of file formats for multiple purposes. Talos has previously discussed in detail these filters and how they operate. The software update to […]

Source:: Cisco Security Notice

What’s in a Name? Threat Intelligence, Artificial Intelligence, and Extreme Snack Foods

By Marc Blackmer What is in a name? A lot, actually. A rose by any other name would certainly smell just as sweet. But if I sold you a dozen dandelions, calling them roses, as the perfect Valentine’s Day gift for your sweetheart, neither of you would be none too pleased, would you? It makes me think of […]

Source:: Cisco Security Notice

What’s in a Name? Threat Intelligence, Artificial Intelligence, and Extreme Snack Foods

By Marc Blackmer What is in a name? A lot, actually. A rose by any other name would certainly smell just as sweet. But if I sold you a dozen dandelions, calling them roses, as the perfect Valentine’s Day gift for your sweetheart, neither of you would be none too pleased, would you? It makes me think of […]

Source:: Cisco Security Notice

Fortinet FortiGate Virtualized Security Available for VMware Cloud on AWS

Fortinet FortiGate Virtualized Security Available for VMware Cloud on AWS

Source:: Fortinet

Fortinet FortiGate Virtualized Security Available for VMware Cloud on AWS

Fortinet FortiGate Virtualized Security Available for VMware Cloud on AWS

Source:: Fortinet

Here Are 3 Things that Drive Security for the Intuitive Network Hint: ISE 2.3 Plays Key Role

By Kevin Skahill We recently announced the Network Intuitive architecture, a new era of networking that removes complexity and enables automation, assurance, and security. With built-in security, you get dynamic protection that enables your business to evolve at the breakneck pace the market demands. Recent events highlight the criticality of securing the digital network against today’s AND tomorrow’s […]

Source:: Cisco Security Notice

Here Are 3 Things that Drive Security for the Intuitive Network Hint: ISE 2.3 Plays Key Role

By Kevin Skahill We recently announced the Network Intuitive architecture, a new era of networking that removes complexity and enables automation, assurance, and security. With built-in security, you get dynamic protection that enables your business to evolve at the breakneck pace the market demands. Recent events highlight the criticality of securing the digital network against today’s AND tomorrow’s […]

Source:: Cisco Security Notice