DeCrypted Blog

Connect.Protect

Will Artificial Intelligence improve security in 2020?

Artificial Intelligence (AI) and Machine Learning (ML) are two of the most hyped buzzwords in the last few years. Will...
Read More

Efficient operations—Using Security Analytics to optimize your user’s experience 

Efficiency often means synergies and savings. It means making good use of resources—both operational manpower, bandwidth and energy—but also time...
Read More

Follow the breadcrumbs

Like the story of Hansel and Gretel, following the small bits of information is often the way to find your way home,...
Read More

What you don’t know, does hurt you!

You can read about cyberattacks in the news almost every day. Security is on top of the agenda at most...
Read More

Clavister’s Keynote at SDN NFV World Congress – 2019

In the end of October Clavister had the opportunity to present a keynote at the SDN NFV World Congress in...
Read More

FBI Warns of Multi Factor Authentication SMSs Being Vulnerable

Instead, they advise Biometrics as the new base line for authentication. Multi-Factor-Authentication (MFA) has been under attack recently by prominent...
Read More

The Future of Network Security Is in the Cloud – Introducing Elastic Secure SD-WAN

Security needs are evolving quickly. Twenty years ago, it was enough with a firewall at your network door—ten years ago...
Read More

Smart Networks with Edge Computing – How to Achieve Robust Security?

Some datacenter functions are moving closer to the user, to the edge of the networks. Welcome to the world of...
Read More

Is 5G more secure than 4G?

It’s a fact: there’s a growing buzz around 5G right now as carriers start to launch their first services. But...
Read More

Empower users with more than MFA

We all know that Two Factor Authentication (2FA) is the foundation of good perimeter security—but it’s often perceived as cumbersome...
Read More

Reflections on Identity and Automation from Gartner’s Security Summit

The recent Gartner summit in London pointed to one inescapable conclusion: Authentication is the hottest topic in security. Businesses have...
Read More

Is MFA the MSSP enabler you have been waiting for?

Security is complex—customers need help and where do they get it? They  typically turn to their local trusted party, their...
Read More

Identity is the New Perimeter

Networks are not what they used to be. Since the introduction of the firewall as the #1 security product to...
Read More

The Bjorn Borg Effect, Sweden and Tech Unicorns

How tech companies like Spotify, Skype, Clavister and others show why Sweden has the perfect conditions for tech incubation Sweden...
Read More

The Threat of the East

Once upon a time, state sponsored surveillance and privacy threats were the domain of the West. But as Chinese telecom...
Read More

Writing Security Policies, the Impossible Mission

Security policies are an essential ingredient to any successful security strategy, some might even argue that policies are the most...
Read More

Move Over GDPR, NIS is the Gorilla in the Room

The new acronym has a far greater impact for cybersecurity than the privacy focused GDPR act. The legislative armageddon known...
Read More

Of Artificial Intelligence and Machine Learning: how cybersecurity needs to know the value of each to get the best of both

Recent discussions within the security community point to a need to understand this two fields to apply them effectively. The...
Read More

A breach of (public) trust?

Two massive political fallouts—one European, one Asian—show that the tolerance for data mishandling is zero. And when GDPR arrives, the...
Read More

Another shot across the World War 3.0 bow?

The expulsion and impending sanctions against Russia for cyberattacks on the 2016 presidential election make the new Cold War a...
Read More