Protect your business during COVID-19 – here is how    |     Rights Issue 2020

DeCrypted Blog

Connect.Protect

The 5G Huawei ban is not enough. To protect our networks and critical infrastructure from harm, far more needs to...
Read More
2 500 years ago, the general and military strategist Sun Tzu wrote the book The Art of War. It is a classic...
Read More
Each year on the first Thursday in May, World Password Day promotes better password habits. Passwords are critical gatekeepers of our...
Read More
With remote working becoming our new normal, there are a few things you need to do to be safe and...
Read More
With medical research desperately searching for a cure to the Corona crisis, what may be our best hope in the...
Read More
From the biggest banks to your company’s network, having an overview of security helps you see the obvious points of...
Read More
There’s no lack of cybersecurity scorecards, but before choosing one, consider the following. Cybersecurity scorecarding has been an aspect of the security...
Read More
You know the feeling—you put on your seatbelt and just pull it one quick time to make sure it locks....
Read More
Identity & Access Management is a very hot segment of the market right now. Specifically access management—as everyone has truly...
Read More
We're all entirely familiar with the idea of a password. We should, we have between 6-10 that we not only...
Read More
How cybersecurity has Evolved: a View from the Trenches. Sometimes I hear the words ’20 years in the business’ and...
Read More
In 2019, one of the most severe ransomware attacks ever reported happened to a Scandanavian aluminium supplier, costing almost €75...
Read More
Artificial Intelligence (AI) and Machine Learning (ML) are two of the most hyped buzzwords in the last few years. Will...
Read More
Efficiency often means synergies and savings. It means making good use of resources—both operational manpower, bandwidth and energy—but also time...
Read More
Like the story of Hansel and Gretel, following the small bits of information is often the way to find your way home,...
Read More
You can read about cyberattacks in the news almost every day. Security is on top of the agenda at most...
Read More
In the end of October Clavister had the opportunity to present a keynote at the SDN NFV World Congress in...
Read More
Instead, they advise Biometrics as the new base line for authentication. Multi-Factor-Authentication (MFA) has been under attack recently by prominent...
Read More
Security needs are evolving quickly. Twenty years ago, it was enough with a firewall at your network door—ten years ago...
Read More
Some datacenter functions are moving closer to the user, to the edge of the networks. Welcome to the world of...
Read More
It’s a fact: there’s a growing buzz around 5G right now as carriers start to launch their first services. But...
Read More
We all know that Two Factor Authentication (2FA) is the foundation of good perimeter security—but it’s often perceived as cumbersome...
Read More
The recent Gartner summit in London pointed to one inescapable conclusion: Authentication is the hottest topic in security. Businesses have...
Read More
Security is complex—customers need help and where do they get it? They  typically turn to their local trusted party, their...
Read More
Networks are not what they used to be. Since the introduction of the firewall as the #1 security product to...
Read More
How tech companies like Spotify, Skype, Clavister and others show why Sweden has the perfect conditions for tech incubation Sweden...
Read More
Once upon a time, state sponsored surveillance and privacy threats were the domain of the West. But as Chinese telecom...
Read More
Security policies are an essential ingredient to any successful security strategy, some might even argue that policies are the most...
Read More
The new acronym has a far greater impact for cybersecurity than the privacy focused GDPR act. The legislative armageddon known...
Read More
Recent discussions within the security community point to a need to understand this two fields to apply them effectively. The...
Read More
Two massive political fallouts—one European, one Asian—show that the tolerance for data mishandling is zero. And when GDPR arrives, the...
Read More
The expulsion and impending sanctions against Russia for cyberattacks on the 2016 presidential election make the new Cold War a...
Read More