Fortinet to Bring Together More than 2,000 Security Thought Leaders and IT Professionals at Accelerate 18
Source:: Fortinet
Fortinet to Bring Together More than 2,000 Security Thought Leaders and IT Professionals at Accelerate 18
Source:: Fortinet
Schick und praktisch sind sie geworden. Unsere 2018er Wandplaner gibt es jetzt „für umme“. Einfach per Mail an vertrieb@oberberg.net anfordern und die Urlaubsplanung 2018 für die Abteilung kann beginnen.
Die ersten 20 Einsender bekommen unseren Jahresplaner frei Haus ins Büro geschickt.
By Zach Spicer The Cisco Product Security Incident Response Team (PSIRT) is committed to protecting customers by sharing security-related information in a timely manner and in different formats. Although some of the information that we receive may not relate to a specific vulnerability or issue in a Cisco product, the information may be valuable to our customers. For […]
Source:: Cisco Security Notice
By Zach Spicer The Cisco Product Security Incident Response Team (PSIRT) is committed to protecting customers by sharing security-related information in a timely manner and in different formats. Although some of the information that we receive may not relate to a specific vulnerability or issue in a Cisco product, the information may be valuable to our customers. For […]
Source:: Cisco Security Notice
By Talos Group This blog post was authored by Marcin Noga of Cisco Talos. Introduction In 2016 Talos released an advisory for CVE-2016-2334, which was a remote code execution vulnerability affecting certain versions of 7zip, a popular compression utility. In this blog post we will walk through the process of weaponizing this vulnerability and creating a fully working […]
Source:: Cisco Security Notice
By Talos Group This blog post was authored by Marcin Noga of Cisco Talos. Introduction In 2016 Talos released an advisory for CVE-2016-2334, which was a remote code execution vulnerability affecting certain versions of 7zip, a popular compression utility. In this blog post we will walk through the process of weaponizing this vulnerability and creating a fully working […]
Source:: Cisco Security Notice
By Anna Shirokova Brute force attacks have existed long before the Internet. As a cryptanalytic attack, it started being used as an attempt to access encrypted data when there were no other options available. With the rise of the Internet, this type of attack was quickly adopted. In a nutshell, a brute force attack consists of systematically trying different credentials until the correct combination […]
Source:: Cisco Security Notice
By Anna Shirokova Brute force attacks have existed long before the Internet. As a cryptanalytic attack, it started being used as an attempt to access encrypted data when there were no other options available. With the rise of the Internet, this type of attack was quickly adopted. In a nutshell, a brute force attack consists of systematically trying different credentials until the correct combination […]
Source:: Cisco Security Notice
Im menschlichen Körper schützt das Immunsystem im Inneren vor Gefahren durch unerwünschte Keime und Viren.
Warum schützen Unternehmen Ihre Netzwerke also nicht von innen, sondern legen i.d.R. viel mehr Wert auf den Schutz der Außengrenzen? Das war über viele Jahre sicherlich ein guten und richtiger Ansatz, weil es nur kontrollierte Zugänge ins Netz gab. Durch die immer stärker zunehmenden Themen Cloud, Mobilität und IoT aber verschwimmen solche festen Grenzen und Übergänge.
Die Gefahr eines Eindringens in Ihr Netzwerk steigt.
Wenn man von üblichen Netzwerkstrukturen ausgeht, hat ein einmal ins LAN gelangter Schädling leichtes Spiel, sich zu verbreiten und Rechner und Server abteilungsübergreifend zu kompromittieren. Hier ist der zentrale Ansatzpunkt für das LAN-Immunsystem. Warum eigentlich muss ein Produktionsnetz mit der Personalabteilung in Verbindung stehen? Was macht der Bereich Vertrieb z.B. im gleichen Netzsegment, wie die Technik?
Eine interne Segmentierungs-Firewall schafft die nötigen Barrieren, damit sich Schadsoftware und Eindringlinge nicht ungehindert in Ihrem Netzwerk bewegen können.
Lesen Sie dazu gerne auch das Whitepaper unseres Technologiepartners Fortinet.
Neugierig, wie das Immunsystem Ihres Netzwerkes aktiviert werden kann? Sprechen wir drüber:

Bastian Breidenbach

Dennis Goslar

By Kevin Skahill The Internet of Things (IoT) is ushering in an exciting digital renaissance that is redefining the traditional models of how healthcare is delivered. With IoT devices such as smart infusion pumps or connected inhalers, healthcare providers can now remotely monitor and adjust care. IoT devices in healthcare, where mobile and wearable devices are increasingly connected […]
Source:: Cisco Security Notice
