Fujitsu PRIMERGY Sonderaktion CAL4Free
Fujitsu PRIMERGY Sonderaktion CAL4Free Bis zum 31.01.2016 gilt die Sonderaktion unseres Technologiepartners Fujitsu. Zu einem qualifizierten Bundle aus einem Fujitsu PRIMERGY Servers (VFY, sprechen Sie mit uns über das für Sie passende Modell) und einer Microsoft Windows Server Lizenz erhalten Sie kostenfreie Windows Server CAL Lizenzen. Im Einzelnen sind das 5 freie CALs beim Erwerb […]
The Value of Collaboration in Weakening Attackers
By Craig Williams Today’s attackers deploy complex and clever threats that are difficult to combat with just one method of defense. In some cases, defenders must go beyond tools for detecting attacks and devise a different approach for obstructing our adversaries‘ ability to operate. As detailed in the Cisco 2016 Annual Security Report… Source:: Cisco […]
The Value of Collaboration in Weakening Attackers
By Craig Williams Today’s attackers deploy complex and clever threats that are difficult to combat with just one method of defense. In some cases, defenders must go beyond tools for detecting attacks and devise a different approach for obstructing our adversaries‘ ability to operate. As detailed in the Cisco 2016 Annual Security Report… Source:: Cisco […]
Forewarned Is Forearmed: Announcing the 2016 Cisco Annual Security Report
By John Stewart Our just-released 2016 Cisco Annual Security Report (ASR) presents a challenging cybersecurity landscape: cyber defense teams are fighting to keep up with rapid global digitization while trying to integrate dozens of vendor solutions, speed up detection, and educate their organizations from top to bottom. Meanwhile attackers grow more bold, flexible, and resilient […]
Forewarned Is Forearmed: Announcing the 2016 Cisco Annual Security Report
By John Stewart Our just-released 2016 Cisco Annual Security Report (ASR) presents a challenging cybersecurity landscape: cyber defense teams are fighting to keep up with rapid global digitization while trying to integrate dozens of vendor solutions, speed up detection, and educate their organizations from top to bottom. Meanwhile attackers grow more bold, flexible, and resilient […]
Internet Explorer – Supportauslauf
Internet Explorer – Supportauslauf Es ist mal wieder soweit: Der Support für einige ältere Versionen des Microsoft Internet-Explorer ist beendet. Das bedeutet die erhebliche Erhöhung des Risikos für den Anwender, denn der Webbrowser hat sich als massives Angriffsziel für Schädlinge längst etabliert. Insofern ist dringend empfohlen, auf die jeweils aktuellste, für das eigene System verfügbare, […]
Research Spotlight: Needles in a Haystack
By Talos Group This post was authored by Mariano Graziano . Malware sandboxes are automated dynamic analysis systems that execute programs in a controlled environment. Within the large volumes of samples submitted daily to these services, some submissions appear to be different from others and show interesting characteristics. At USENIX Security 2015 I presented a […]

