Blog

Seeing the Wolf in the Herd: Analytics In the Age of Ransomware

In 2019, one of the most severe ransomware attacks ever reported happened to a Scandanavian aluminium supplier, costing almost €75 million in damages. But they’d rather that then pay the…
Read more

Will Artificial Intelligence improve security in 2020?

Artificial Intelligence (AI) and Machine Learning (ML) are two of the most hyped buzzwords in the last few years. Will they pass the peak of the Hype Cycle and deliver…
Read more

Efficient operations—Using Security Analytics to optimize your user’s experience 

Efficiency often means synergies and savings. It means making good use of resources—both operational manpower, bandwidth and energy—but also time and effort. Running an efficient network is a big challenge…
Read more

Follow the breadcrumbs

Like the story of Hansel and Gretel, following the small bits of information is often the way to find your way home, or in this case to the attack perpetrator.  Security analytics…
Read more

What you don’t know, does hurt you!

You can read about cyberattacks in the news almost every day. Security is on top of the agenda at most companies across all industries but how do you know your…
Read more

Security NFV

Clavister’s Keynote at SDN NFV World Congress – 2019

In the end of October Clavister had the opportunity to present a keynote at the SDN NFV World Congress in The Hague, The Netherlands. We delivered a pitch on Elastic Secure SD-WAN – an emerging way to deliver security use-cases.

FBI Warns of Multi Factor Authentication SMSs Being Vulnerable

Instead, they advise Biometrics as the new base line for authentication. Multi-Factor-Authentication (MFA) has been under attack recently by prominent government instances. The American FBI issued a firm warning to…
Read more

The Future of Network Security Is in the Cloud – Introducing Elastic Secure SD-WAN

Security needs are evolving quickly. Twenty years ago, it was enough with a firewall at your network door—ten years ago you sufficed with segmentation—today this is not enough. Users are…
Read more

Smart Networks with Edge Computing

Smart Networks with Edge Computing – How to Achieve Robust Security?

Some datacenter functions are moving closer to the user, to the edge of the networks. Welcome to the world of Edge Cloud Computing—but how does security evolve? We’re in the…
Read more

Is 5G more secure than 4G?

Is 5G more secure than 4G?

It’s a fact: there’s a growing buzz around 5G right now as carriers start to launch their first services. But the question few ask is if 5G is more secure…
Read more