To be Effective, Security Needs to Be a Force Multiplier

By Jason Lamar Effective security is simple, open, and automated. We’ve already talked about simple and open. Now let’s talk about automated. Security admins can relate to this scenario. You just learned of an infected system in your environment of thousands of devices. How many others are affected? That’s hard to figure out even in […]

Support:Recording Build 114700 available

Source:: Innovaphone

Support:Recording Build 114700 available

Source:: Innovaphone

Support:IQM Build 8020200 available

Source:: Innovaphone

Support:IQM Build 8020200 available

Source:: Innovaphone

Microsoft Windows 2016 Nano Server

Microsoft Windows 2016 Nano Server. Der Microsoft Windows Server kann nicht nur mit grafischer Oberfläche betrieben werden. Hier schildert unser Techniker George Maric kurz die Entwicklung und die Beweggründe, warum man auf die GUI verzichtet: Mit Windows Server 2008 führte Microsoft den Core Server ein. Der Name spiegelte den Gedanken wieder, den Server auf Kernmerkmale […]

In plain sight: Credential and data stealing adware

By Veronica Valeros Adware has been around for a while now. In principle, displaying advertising in order to finance your software is not necessarily something bad. Users are used to seeing advertising everywhere: newspapers, magazines, and websites. When advertising was introduced to software, users had a surprisingly high tolerance for it. Later, adware applications became […]