Protect your business during COVID-19 – here is how    |     Rights Issue 2020

Blog

The Devil’s in the Details

The 5G Huawei ban is not enough. To protect our networks and critical infrastructure from harm, far more needs to be done writes telecoms expert Stefan Brodin. 5G networks are starting to be rolled out across Europe and the rest of the world. It’s said to be a technological revolution that will transform industries and…
Read more

The Art of Cyberwar

2 500 years ago, the general and military strategist Sun Tzu wrote the book The Art of War. It is a classic book on military strategy which is still being referenced at military schools around the world.   Let’s reflect on what has changed since then. Are Sun Tzu’s wisdoms still relevant? One major difference is technology and weapons, which of course…
Read more

World Password Day Signals Perfect Time to Reveal Clavister EasyAccess 3.2

Each year on the first Thursday in May, World Password Day promotes better password habits. Passwords are critical gatekeepers of our digital identities, allowing us to access online shopping, dating, banking, social media, private work, and life communications. Passwords are critical to our digital life, yet we are extremely poor at remembering good versions of them.…
Read more

How to Remote Work Like a Boss

With remote working becoming our new normal, there are a few things you need to do to be safe and effective. Some professions like nurses, firefighters, mailmen and clerks will not be able to change to a ”work-from-home” mode as the world around us changes. However, a large number of us have the luxury to…
Read more

How Tech Will Beat COVID-19

With medical research desperately searching for a cure to the Corona crisis, what may be our best hope in the meantime is for technology to save the day. Here’s how… By now we’ve all become almost fatigued with the news cycle’s daily curves that grimly tell the tale of our times. That the COVID-19 virus…
Read more

How protected are you?

From the biggest banks to your company’s network, having an overview of security helps you see the obvious points of exploitation. The Antwerpen Diamond Center was supposed to be impenetrable. The vault itself was protected by ten impregnable layers of security including magnetic, light and heat sensors; infrared motion detectors and seismic detection warnings as…
Read more

Scorecarding in the Age of Threat

There’s no lack of cybersecurity scorecards, but before choosing one, consider the following. Cybersecurity scorecarding has been an aspect of the security scene for five years as IT admins looked for a simple and fast answer to a critical question: how safe is my network? The answer was to monitor critical aspects that would serve as key indicators on…
Read more

First You Secure, Then You Score!

You know the feeling—you put on your seatbelt and just pull it one quick time to make sure it locks. It’s a natural behavior for us humans, to be a bit skeptical. Better to be sure by testing, checking, trying. It’s a similar feeling with implementing a firewall. You fire it up and if it…
Read more

Looking Into The Future: Trends in Identity & Access Management

Identity & Access Management is a very hot segment of the market right now. Specifically access management—as everyone has truly come to the understanding that passwords are our biggest enemy—is racing to remove them. But IAM is much more than that—it combines key areas: Secure Authentication —facilitating the multi-factor authentication in a user-friendly way, Network…
Read more

Authentication Is What You Do As Much As Who You Are

We’re all entirely familiar with the idea of a password. We should, we have between 6-10 that we not only use but use multiple times a day, across 90 different sites that we navigate. And because our brain craves simplicity, we typically use the same password for all those sites. We make them easy to…
Read more