Category: DeCrypted Blog

Connect.Protect

Keynote at SDN NFV World Congress – 2019

Clavister’s Keynote at SDN NFV World Congress – 2019

In the end of October Clavister had the opportunity to present a keynote at the SDN NFV World Congress in The Hague, The Netherlands. We delivered a pitch on Elastic Secure SD-WAN – an emerging way to deliver security use-cases.

Smart Networks with Edge Computing

Smart Networks with Edge Computing – How to Achieve Robust Security?

Some datacenter functions are moving closer to the user, to the edge of the networks. Welcome to the world of Edge Cloud Computing—but how does security evolve? We’re in the midst of an IoT revolution with smart cities, factories and homes that require systems and devices to be connected at all times, producing a massive…
Read more

Is 5G more secure than 4G?

Is 5G more secure than 4G?

It’s a fact: there’s a growing buzz around 5G right now as carriers start to launch their first services. But the question few ask is if 5G is more secure than 4G? Is 5G even needed? And how does 5G play out from a security perspective? By now, we’ve all heard probably of the coming…
Read more

Hacker Summer Camp Recap

Every August, thousands of hackers, security professionals, law enforcement agents, and computer enthusiasts flock to Las Vegas to attend a series of security events known collectively as the hacker summer camp. The events include the two long-running conferences Black Hat and DEFCON, along with the recently established BSides Las Vegas event. The three events spanning…
Read more

clavister decrypted news

Writing Security Policies, the Impossible Mission

Security policies are an essential ingredient to any successful security strategy, some might even argue that policies are the most important part of security controls, but how easy is it to write those security policies? Well, not as easy as we all want it to be. Clavister’s resident security expert, Ahmed Musaad, gives a primer…
Read more

Move Over GDPR, NIS is the Gorilla in the Room

The new acronym has a far greater impact for cybersecurity than the privacy focused GDPR act. The legislative armageddon known as the General Data Protection Regulation or GDPR is fast approaching this May with the financial consequences for non-compliance (up to 4 percent of worldwide total) causing a fair amount of justified alarm. But however important that…
Read more

A breach of (public) trust?

Two massive political fallouts—one European, one Asian—show that the tolerance for data mishandling is zero. And when GDPR arrives, the repercussions will be financial as well. This week, the Swedish government barely managed to survive one its most serious challenges. A vote of no confidence was mounted against three ministers by the opposition that—in normal…
Read more

Another shot across the World War 3.0 bow?

The expulsion and impending sanctions against Russia for cyberattacks on the 2016 presidential election make the new Cold War a few degrees hotter It’s yet another development of World War 3.0 – the slow and steady march of nation state sponsored cyber conflict, as entities hit against digital and even critical infrastructures. US president Obama’s…
Read more