FUJITSU Aktionsmodelle Dezember 2017
Zum Endspurt auf das Jahresende hin haben wir noch ein paar Anregungen für Sie zusammengestellt. Auch zum Abschluss des Jahres gibt es wieder besondere Aktionsgeräte unseres Partners FUJITSU. Wählen Sie aus den Bereichen Mobilgeräte, stationäre Rechner, oder Server und Speichersysteme. Sollte hier nicht die Wunschkonfiguration enthalten sein, helfen wir gerne persönlich weiter: Frank Erlinghagen 02261 […]
Shaping a Diverse and Stronger Cybersecurity Industry
By Steve Martino Aside from scuba diving and working with Cisco customers to improve cyber resiliency, cooking is one of my greatest passions. My favorite dishes are a fusion of the best ingredients, each complementing the other and accentuating the right flavors to achieve culinary heaven. You see, if you stick with one ingredient, you […]
Shaping a Diverse and Stronger Cybersecurity Industry
By Steve Martino Aside from scuba diving and working with Cisco customers to improve cyber resiliency, cooking is one of my greatest passions. My favorite dishes are a fusion of the best ingredients, each complementing the other and accentuating the right flavors to achieve culinary heaven. You see, if you stick with one ingredient, you […]
Microsoft Patch Tuesday – December 2017
By Talos Group Today, Microsoft has released its monthly set of security advisories for vulnerabilities that have been identified and addressed in various products. This month’s advisory release addresses 34 new vulnerabilities with 21 of them rated critical and 13 of them rated important. These vulnerabilities impact Edge, Exchange, Internet Explorer, Office, Scripting Engine, Windows, […]
Microsoft Patch Tuesday – December 2017
By Talos Group Today, Microsoft has released its monthly set of security advisories for vulnerabilities that have been identified and addressed in various products. This month’s advisory release addresses 34 new vulnerabilities with 21 of them rated critical and 13 of them rated important. These vulnerabilities impact Edge, Exchange, Internet Explorer, Office, Scripting Engine, Windows, […]
Hackers are using encryption to bypass your security controls
By Sabiha Rouksana H. As of today more than half of the web traffic is encrypted. That’s a big win for businesses and all of us, since it guards against eavesdropping and tampering with content as it moves from device to server and back again. Of course this rise in encryption comes with one big, […]
Hackers are using encryption to bypass your security controls
By Sabiha Rouksana H. As of today more than half of the web traffic is encrypted. That’s a big win for businesses and all of us, since it guards against eavesdropping and tampering with content as it moves from device to server and back again. Of course this rise in encryption comes with one big, […]

