Looking Into a Crystal Ball for the Future of Cybersecurity
By Mary Ellen Zurko Every once in a while you need to take a step back, and think about the future. Where’s a good place to look for high risk, high opportunity ideas in the future of computer security? New Security Paradigms Workshop (NSPW) is a crystal ball view into the future of cybersecurity. NSPW […]
Fujitsu Aktionsmodelle Oktober 2015
Fujitsu Aktionsmodelle Oktober 2015 Auch im Oktober gibt es wieder preiswerte Produkte für den Geschäftseinsatz bei uns. Ob Notebooks, PCs, Displays, Tablets, Server oder Storage – bei Oberberg-Online, Ihrem Fujitsu Select Expert Partner finden Sie Ihre passende Lösung. Egal, ob für den Handwerksbetrieb, den Dienstleister, oder im Bereich Industrie – Oberberg-Online und Fujitsu sind […]
Cybersecurity: What Needs to Change Now
By John Stewart October is National Cyber Security Awareness Month in the United States. This year’s campaign emphasizes cybersecurity as part of a deliberate strategy and a shared responsibility, not just a checkbox item. At Cisco, we believe two key things must change in the security industry. First, we need to acknowledge that security is […]
Cybersecurity: What Needs to Change Now
By John Stewart October is National Cyber Security Awareness Month in the United States. This year’s campaign emphasizes cybersecurity as part of a deliberate strategy and a shared responsibility, not just a checkbox item. At Cisco, we believe two key things must change in the security industry. First, we need to acknowledge that security is […]
Jetzt noch neue Domainendungen für November reservieren!
Heute möchten wir Ihnen einige neue Domainendungen, sogenannte nTLD’s, vorstellen, welche voraussichtlich im kommenden Monat freigeschaltet werden. Warum werden überhaupt neue Domainendungen eingeführt? Ganz einfach. Die bisherigen Domainendungen werden immer knapper. Durch die Einführung der bisher ca. 1400 geplanten neuen Domainendungen steht Ihnen eine wesentlich größere Auswahl zur Verfügung und Sie können die genau zu […]
Down the Rabbit Hole: Botnet Analysis for Non-Reverse Engineers
By Talos Group This post is authored by Earl Carter & Holger Unterbrink . Overview Talos is often tasked with mapping the backend network for a specific piece of malware. One approach is to first reverse engineer the sample and determine exactly how it operates. But what if there is no time or resources to […]
Down the Rabbit Hole: Botnet Analysis for Non-Reverse Engineers
By Talos Group This post is authored by Earl Carter & Holger Unterbrink . Overview Talos is often tasked with mapping the backend network for a specific piece of malware. One approach is to first reverse engineer the sample and determine exactly how it operates. But what if there is no time or resources to […]

