Category: DeCrypted Blog

Connect.Protect

How protected are you?

From the biggest banks to your company’s network, having an overview of security helps you see the obvious points of exploitation. The Antwerpen Diamond Center was supposed to be impenetrable. The vault itself was protected by ten impregnable layers of security including magnetic, light and heat sensors; infrared motion detectors and seismic detection warnings as…
Read more

Looking Into The Future: Trends in Identity & Access Management

Identity & Access Management is a very hot segment of the market right now. Specifically access management—as everyone has truly come to the understanding that passwords are our biggest enemy—is racing to remove them. But IAM is much more than that—it combines key areas: Secure Authentication —facilitating the multi-factor authentication in a user-friendly way, Network…
Read more

Efficient operations—Using Security Analytics to optimize your user’s experience 

Efficiency often means synergies and savings. It means making good use of resources—both operational manpower, bandwidth and energy—but also time and effort. Running an efficient network is a big challenge as it requires the administrator to take tight control of each packet, analyze it and take appropriate action. It’s tempting for an IT administrator to use the…
Read more

What you don’t know, does hurt you!

You can read about cyberattacks in the news almost every day. Security is on top of the agenda at most companies across all industries but how do you know your protection status?   Security is complex and it’s no surprise that analytics plays an important role. It’s common to have limited or siloed visibility to what’s happening across…
Read more

Security NFV

Clavister’s Keynote at SDN NFV World Congress – 2019

In the end of October Clavister had the opportunity to present a keynote at the SDN NFV World Congress in The Hague, The Netherlands. We delivered a pitch on Elastic Secure SD-WAN – an emerging way to deliver security use-cases.

FBI Warns of Multi Factor Authentication SMSs Being Vulnerable

Instead, they advise Biometrics as the new base line for authentication. Multi-Factor-Authentication (MFA) has been under attack recently by prominent government instances. The American FBI issued a firm warning to enterprises that MFA with OTP SMS is not as safe as it appears to be with wide press coverage in media such as forbes.com and…
Read more

Smart Networks with Edge Computing

Smart Networks with Edge Computing – How to Achieve Robust Security?

Some datacenter functions are moving closer to the user, to the edge of the networks. Welcome to the world of Edge Cloud Computing—but how does security evolve? We’re in the midst of an IoT revolution with smart cities, factories and homes that require systems and devices to be connected at all times, producing a massive…
Read more

Is 5G more secure than 4G?

Is 5G more secure than 4G?

It’s a fact: there’s a growing buzz around 5G right now as carriers start to launch their first services. But the question few ask is if 5G is more secure than 4G? Is 5G even needed? And how does 5G play out from a security perspective? By now, we’ve all heard probably of the coming…
Read more

clavister decrypted news

Writing Security Policies, the Impossible Mission

Security policies are an essential ingredient to any successful security strategy, some might even argue that policies are the most important part of security controls, but how easy is it to write those security policies? Well, not as easy as we all want it to be. Clavister’s resident security expert, Ahmed Musaad, gives a primer…
Read more

Move Over GDPR, NIS is the Gorilla in the Room

The new acronym has a far greater impact for cybersecurity than the privacy focused GDPR act. The legislative armageddon known as the General Data Protection Regulation or GDPR is fast approaching this May with the financial consequences for non-compliance (up to 4 percent of worldwide total) causing a fair amount of justified alarm. But however important that…
Read more