Category: DeCrypted Blog

Connect.Protect

On Third-Party Libraries and Security

Don’t reinvent the wheel. If you went to a computer science college or read some of the popular programming books, you would often stumble upon this advice, often written in big bold letters to highlight its importance. It’s sound advice, we shouldn’t reinvent things; instead we should improve those things that already exist. Developers nowadays…
Read more

Efficient operations—Using Security Analytics to optimize your user’s experience 

Efficiency often means synergies and savings. It means making good use of resources—both operational manpower, bandwidth and energy—but also time and effort. Running an efficient network is a big challenge as it requires the administrator to take tight control of each packet, analyze it and take appropriate action. It’s tempting for an IT administrator to use the…
Read more

What you don’t know, does hurt you!

You can read about cyberattacks in the news almost every day. Security is on top of the agenda at most companies across all industries but how do you know your protection status?   Security is complex and it’s no surprise that analytics plays an important role. It’s common to have limited or siloed visibility to what’s happening across…
Read more

Keynote at SDN NFV World Congress – 2019

Clavister’s Keynote at SDN NFV World Congress – 2019

In the end of October Clavister had the opportunity to present a keynote at the SDN NFV World Congress in The Hague, The Netherlands. We delivered a pitch on Elastic Secure SD-WAN – an emerging way to deliver security use-cases.

FBI Warns of Multi Factor Authentication SMSs Being Vulnerable

Instead, they advise Biometrics as the new base line for authentication. Multi-Factor-Authentication (MFA) has been under attack recently by prominent government instances. The American FBI issued a firm warning to enterprises that MFA with OTP SMS is not as safe as it appears to be with wide press coverage in media such as forbes.com and…
Read more

Smart Networks with Edge Computing

Smart Networks with Edge Computing – How to Achieve Robust Security?

Some datacenter functions are moving closer to the user, to the edge of the networks. Welcome to the world of Edge Cloud Computing—but how does security evolve? We’re in the midst of an IoT revolution with smart cities, factories and homes that require systems and devices to be connected at all times, producing a massive…
Read more

Is 5G more secure than 4G?

Is 5G more secure than 4G?

It’s a fact: there’s a growing buzz around 5G right now as carriers start to launch their first services. But the question few ask is if 5G is more secure than 4G? Is 5G even needed? And how does 5G play out from a security perspective? By now, we’ve all heard probably of the coming…
Read more

Hacker Summer Camp Recap

Every August, thousands of hackers, security professionals, law enforcement agents, and computer enthusiasts flock to Las Vegas to attend a series of security events known collectively as the hacker summer camp. The events include the two long-running conferences Black Hat and DEFCON, along with the recently established BSides Las Vegas event. The three events spanning…
Read more

clavister decrypted news

Writing Security Policies, the Impossible Mission

Security policies are an essential ingredient to any successful security strategy, some might even argue that policies are the most important part of security controls, but how easy is it to write those security policies? Well, not as easy as we all want it to be. Clavister’s resident security expert, Ahmed Musaad, gives a primer…
Read more

Move Over GDPR, NIS is the Gorilla in the Room

The new acronym has a far greater impact for cybersecurity than the privacy focused GDPR act. The legislative armageddon known as the General Data Protection Regulation or GDPR is fast approaching this May with the financial consequences for non-compliance (up to 4 percent of worldwide total) causing a fair amount of justified alarm. But however important that…
Read more