2020

Cloud·Cybersecurity Strategy·Data Security

SASE – a cloud-based model for network security beyond the data center

SASE emerged as a new buzzword in forums and company presentations during the end of 2019. SASE, pronounced ‘Sassy’, stands for Security Access Service Edge. Put simply, it is an efficient way of…

Cybercrime·Data Security

Phishing is dead, long live smishing

In fact, the title of this post is misleading, phishing is unfortunately far from being dead and buried. Cybercriminals continue to use all sorts of tricks to get their victims to click on malicious…

Cloud·Cybercrime·Data Security

Confidential Computing – Safe from prying eyes

Many companies are now putting the cloud first in their IT strategy, particularly in terms of using public cloud services. Whether that makes sense or not is open to judgment, but the trend looks like…

Cybercrime·Data Security

IT Security – Let’s not forget the basics

It can become tedious writing about the same thing over and over again. But reading about the same thing happening time and time again is really bad for our blood pressure. A good example of this is…

Data Security

Privacy shield is riddled with holes

It’s official: The Privacy Shield is a mess of gaping holes and was officially declared invalid in mid-July. Although the report itself has already been buried in the media, companies and…

Cybercrime·Cybersecurity Strategy·Data Security

Full points for DNS vulnerability SIGRed on the CVSS scale

Sometimes finishing with 10 out of 10 points is a reason for celebration. Unfortunately, in this case, things are different. A newly discovered vulnerability in Windows DNS servers, SIGRed has…

Cybersecurity Strategy·Data Security·VPN

Segmenting networks for Industrial Control Systems

IT security is increasingly being recognized by most companies as an important aspect of IT security strategy in Industrial Control Systems (ICS). Some measures differ fundamentally from IT security…

Data Security·Endpoint Management

Time for stable and secure VPN

Market researchers are reporting divided opinion on the pros and cons of remote working. While some research reports an overwhelming majority of employees as die-hard remote working fans who never…

Cloud·Cybersecurity Strategy·Data Security

The right way to join the Microsoft cloud

The public cloud is trending and that is a good thing. For many companies, leveraging cloud resources brings benefits – both in terms of IT flexibility and security. For example, Microsoft spends more…

Cloud·Connected Cars·Digital Signage·Internet of Things

Smart maintenance – secure communication over insecure networks

The term Internet of Things came was coined more than 20 years ago. Today, IoT has already penetrated a wide range of sectors such as healthcare, finance, retail and consumer electronics. Many…