Empower users with more than MFA
By Johan Edlund, Chief Marketing & Products Officer / 2019-10-04
We all know that Two Factor Authentication (2FA) is the foundation of good perimeter security—but it’s often perceived as cumbersome...
Read More
Reflections on Identity and Automation from Gartner’s Security Summit
By Kate Linwood / 2019-09-20
The recent Gartner summit in London pointed to one inescapable conclusion: Authentication is the hottest topic in security. Businesses have...
Read More
Is MFA the MSSP enabler you have been waiting for?
By Kate Linwood / 2019-09-18
Security is complex—customers need help and where do they get it? They typically turn to their local trusted party, their...
Read More
Identity is the New Perimeter
By Kate Linwood / 2019-09-13
Networks are not what they used to be. Since the introduction of the firewall as the #1 security product to...
Read More
The Bjorn Borg Effect, Sweden and Tech Unicorns
By Jenny Ramkrans, Chief of Staff / 2019-09-05
How tech companies like Spotify, Skype, Clavister and others show why Sweden has the perfect conditions for tech incubation Sweden...
Read More
The Threat of the East
By Kate Linwood / 2019-08-16
Once upon a time, state sponsored surveillance and privacy threats were the domain of the West. But as Chinese telecom...
Read More
Writing Security Policies, the Impossible Mission
By Kate Linwood / 2018-11-19
Security policies are an essential ingredient to any successful security strategy, some might even argue that policies are the most...
Read More
Move Over GDPR, NIS is the Gorilla in the Room
By Kate Linwood / 2018-01-04
The new acronym has a far greater impact for cybersecurity than the privacy focused GDPR act. The legislative armageddon known...
Read More
Of Artificial Intelligence and Machine Learning: how cybersecurity needs to know the value of each to get the best of both
By Kate Linwood / 2017-08-27
Recent discussions within the security community point to a need to understand this two fields to apply them effectively. The...
Read More
A breach of (public) trust?
By Kate Linwood / 2017-07-28
Two massive political fallouts—one European, one Asian—show that the tolerance for data mishandling is zero. And when GDPR arrives, the...
Read More
Another shot across the World War 3.0 bow?
By Kate Linwood / 2017-01-02
The expulsion and impending sanctions against Russia for cyberattacks on the 2016 presidential election make the new Cold War a...
Read More