Blog

The Art of Cyberwar

2 500 years ago, the general and military strategist Sun Tzu wrote the book The Art of War. It is a classic book on military strategy which is still being referenced at military…
Read more

World Password Day Signals Perfect Time to Reveal Clavister EasyAccess 3.2

Each year on the first Thursday in May, World Password Day promotes better password habits. Passwords are critical gatekeepers of our digital identities, allowing us to access online shopping, dating, banking,…
Read more

How to Remote Work Like a Boss

With remote working becoming our new normal, there are a few things you need to do to be safe and effective. Some professions like nurses, firefighters, mailmen and clerks will…
Read more

How Tech Will Beat COVID-19

With medical research desperately searching for a cure to the Corona crisis, what may be our best hope in the meantime is for technology to save the day. Here’s how……
Read more

How protected are you?

From the biggest banks to your company’s network, having an overview of security helps you see the obvious points of exploitation. The Antwerpen Diamond Center was supposed to be impenetrable.…
Read more

Scorecarding in the Age of Threat

There’s no lack of cybersecurity scorecards, but before choosing one, consider the following. Cybersecurity scorecarding has been an aspect of the security scene for five years as IT admins looked for a simple and…
Read more

First You Secure, Then You Score!

You know the feeling—you put on your seatbelt and just pull it one quick time to make sure it locks. It’s a natural behavior for us humans, to be a…
Read more

Looking Into The Future: Trends in Identity & Access Management

Identity & Access Management is a very hot segment of the market right now. Specifically access management—as everyone has truly come to the understanding that passwords are our biggest enemy—is…
Read more

Authentication Is What You Do As Much As Who You Are

We’re all entirely familiar with the idea of a password. We should, we have between 6-10 that we not only use but use multiple times a day, across 90 different…
Read more

The New Threat Is You

How cybersecurity has Evolved: a View from the Trenches. Sometimes I hear the words ’20 years in the business’ and think that sounds so substantial; so long. Fully half my…
Read more