Category: DeCrypted Blog

Smart Networks with Edge Computing

Smart Networks with Edge Computing – How to Achieve Robust Security?

Some datacenter functions are moving closer to the user, to the edge of the networks. Welcome to the world of Edge Cloud Computing—but how does security evolve? We’re in the midst of an IoT revolution with smart cities, factories and homes that require systems and devices to be connected at all times, producing a massive…
Read more

Is 5G more secure than 4G?

Is 5G more secure than 4G?

It’s a fact: there’s a growing buzz around 5G right now as carriers start to launch their first services. But the question few ask is if 5G is more secure than 4G? Is 5G even needed? And how does 5G play out from a security perspective? By now, we’ve all heard probably of the coming…
Read more

clavister decrypted news

Writing Security Policies, the Impossible Mission

Security policies are an essential ingredient to any successful security strategy, some might even argue that policies are the most important part of security controls, but how easy is it to write those security policies? Well, not as easy as we all want it to be. Clavister’s resident security expert, Ahmed Musaad, gives a primer…
Read more

Move Over GDPR, NIS is the Gorilla in the Room

The new acronym has a far greater impact for cybersecurity than the privacy focused GDPR act. The legislative armageddon known as the General Data Protection Regulation or GDPR is fast approaching this May with the financial consequences for non-compliance (up to 4 percent of worldwide total) causing a fair amount of justified alarm. But however important that…
Read more

A breach of (public) trust?

Two massive political fallouts—one European, one Asian—show that the tolerance for data mishandling is zero. And when GDPR arrives, the repercussions will be financial as well. This week, the Swedish government barely managed to survive one its most serious challenges. A vote of no confidence was mounted against three ministers by the opposition that—in normal…
Read more

Another shot across the World War 3.0 bow?

The expulsion and impending sanctions against Russia for cyberattacks on the 2016 presidential election make the new Cold War a few degrees hotter It’s yet another development of World War 3.0 – the slow and steady march of nation state sponsored cyber conflict, as entities hit against digital and even critical infrastructures. US president Obama’s…
Read more