Vulnerability Spotlight: Libgraphite Font Processing Vulnerabilities

By Talos Group Vulnerabilities Discovered by Yves Younan of Cisco Talos. Talos is releasing an advisory for four vulnerabilities that have been found within the Libgraphite library, which is used for font processing in Linux, Firefox, OpenOffice, and other major applications. The most severe vulnerability results from an out-of-bounds read which the attacker can use […]

Fujitsu Aktionsmodelle Februar 2016

Neue Angebote für Ihr Business. Auch wenn der Februar ein kurzer Monat ist und hier im Rheinland viele Jecken Karneval feiern, haben wir wieder frisch und aktuell die Fujtsu Aktionsmodelle für den Februar für Sie zusammengestellt: Monitore und Desktop-PCs finden Sie hier. Tablets und Notebooks gibt es hier. Und Server und Storage-Systeme sind hier zu […]

Jetzt sparen mit Microsoft Windows Server – OEM Lizenzen

OEM CALs sind bis zu 50% günstiger bei identischen Zugriffsrechten wie OPEN CALs. Entweder Geld sparen oder in eine Software Assurance investieren und Zugriffsrechte ebenfalls auf Windows Server 2016 erhalten. Auch bei Windows Server Standard und Datacenter gilt: OEM ist erheblich günstiger und hat genau wie OPEN uneingeschränkte Downgrade- und VM-Portabilitäts-Rechte. Software Assurance* plus OEM-Lizenz […]

Cisco Hosting Amsterdam 2016 FIRST Technical Colloquium

By Matt Valites We’d like to announce a “Save the Date” and “Call for Speakers” for the FIRST Amsterdam Technical Colloquium (TC) 2016 . The event, hosted by Cisco Systems in Amsterdam, Netherlands will be a plenary style conference held on the 19th and 20th of April 2016. Event registration is open now. This will […]

Cisco Hosting Amsterdam 2016 FIRST Technical Colloquium

By Matt Valites We’d like to announce a “Save the Date” and “Call for Speakers” for the FIRST Amsterdam Technical Colloquium (TC) 2016 . The event, hosted by Cisco Systems in Amsterdam, Netherlands will be a plenary style conference held on the 19th and 20th of April 2016. Event registration is open now. This will […]

Find Advanced Threats with Cisco Cognitive Threat Analytics

By Joe Malenfant Attackers are constantly innovating, employing more sophisticated techniques to compromise organizations and gain access to other parts of the network and sensitive data including proprietary information, trade secrets, and of course financial information. Threats have evolved to the point that it’s no longer feasible to simply defend the perimeter. In the 2016 […]

Find Advanced Threats with Cisco Cognitive Threat Analytics

By Joe Malenfant Attackers are constantly innovating, employing more sophisticated techniques to compromise organizations and gain access to other parts of the network and sensitive data including proprietary information, trade secrets, and of course financial information. Threats have evolved to the point that it’s no longer feasible to simply defend the perimeter. In the 2016 […]