Blog

Empower users with more than MFA

Empower users with more than MFA

We all know that Two Factor Authentication (2FA) is the foundation of good perimeter security—but it’s often perceived as cumbersome to use. Users want a smooth way to login, it’s why they save passwords in the login dialogues when possible—or choose poor quality, easy to remember variations of passwords. Convenience is, in some ways, the…
Read more

Reflections on Identity and Automation from Gartner’s Security Summit

The recent Gartner summit in London pointed to one inescapable conclusion: Authentication is the hottest topic in security. Businesses have spent billions on security solutions—but does any CEO feel safer for all that investment? Data breaches, ransomware situations and corporate hacks reach the headlines with financial impacts reaching into the hundreds of millions USD. I…
Read more

Is MFA the MSSP enabler you have been waiting for?

Is MFA the MSSP enabler you have been waiting for?

Security is complex—customers need help and where do they get it? They  typically turn to their local trusted party, their IT partner. Those trusted parties are the competent resellers all over the world: the ones who advise, who install and configure the security solutions and serve as the trusted advisor for what to do next.…
Read more

Identity is the New Perimeter

Networks are not what they used to be. Since the introduction of the firewall as the #1 security product to protect your business the world’s ways of working have evolved, massively. Firstly, depending on culture and country, remote working has become very common and employees expect the same access to services outside the office as…
Read more

The Bjorn Borg Effect, Sweden and Tech Unicorns

How tech companies like Spotify, Skype, Clavister and others show why Sweden has the perfect conditions for tech incubation Sweden is amazing for many reasons, its healthy lifestyle and population, its incredible nature and open expanses and its open-minded Nordic attitudes. What might come as a surprise though is that it’s also a tech superpower,…
Read more

The Threat of the East

Once upon a time, state sponsored surveillance and privacy threats were the domain of the West. But as Chinese telecom infrastructure vendor Huawei shows, Asia is emerging as a formidable threat to our businesses.

clavister decrypted news

Writing Security Policies, the Impossible Mission

Security policies are an essential ingredient to any successful security strategy, some might even argue that policies are the most important part of security controls, but how easy is it to write those security policies? Well, not as easy as we all want it to be. Clavister’s resident security expert, Ahmed Musaad, gives a primer…
Read more

Move Over GDPR, NIS is the Gorilla in the Room

The new acronym has a far greater impact for cybersecurity than the privacy focused GDPR act. The legislative armageddon known as the General Data Protection Regulation or GDPR is fast approaching this May with the financial consequences for non-compliance (up to 4 percent of worldwide total) causing a fair amount of justified alarm. But however important that…
Read more

Of Artificial Intelligence and Machine Learning: how cybersecurity needs to know the value of each to get the best of both

Recent discussions within the security community point to a need to understand this two fields to apply them effectively. The increasing drumbeat of machine learning (ML) and Artificial Intelligence (AI) as it affects cybersecurity is growing, a fact that was easily seen at the recent Black Hat 2017 gathering. Of the vendors and solutions present,…
Read more

A breach of (public) trust?

Two massive political fallouts—one European, one Asian—show that the tolerance for data mishandling is zero. And when GDPR arrives, the repercussions will be financial as well. This week, the Swedish government barely managed to survive one its most serious challenges. A vote of no confidence was mounted against three ministers by the opposition that—in normal…
Read more