• The Secret to Effective Remote Access VPN Management

    more
    Cybercrime·Cybersecurity Strategy

    ICS under fire: Water treatment plant hacked

    Industrial Control Systems (ICS) are like a little brother who is slow on the uptake compared to grown-up IT. Although ICS can do almost anything that IT can do, uses the same protocols and is similar…

    Cybercrime·Data Security

    The end of Emotet

    We've all pretty much gotten used to the fact that malware isn’t likely to go away any time soon. Malware only usually makes the headlines these days if it causes substantial damage or is particularly…

    Cybercrime·Data Security

    The SolarWinds Hack – Pearl Harbor without planes

    As if 2020 wasn’t unpleasant enough, the SolarWinds hack added fuel to the fire right at the end of the year. A – presumably – state-sponsored hacker group managed to break into the product…

    Cybersecurity Strategy·Data Security

    IT security in 2021: Things can always get worse

    Usually this is the spot where we make our forecasts for 2021 based on the latest press releases from IT security providers. But you might have to wait a little longer for that, at least until the…

    Cloud·Cybersecurity Strategy·Data Security

    SASE – a cloud-based model for network security beyond the data center

    SASE emerged as a new buzzword in forums and company presentations during the end of 2019. SASE, pronounced ‘Sassy’, stands for Security Access Service Edge. Put simply, it is an efficient way of…

    Cybercrime·Data Security

    Phishing is dead, long live smishing

    In fact, the title of this post is misleading, phishing is unfortunately far from being dead and buried. Cybercriminals continue to use all sorts of tricks to get their victims to click on malicious…

    Cloud·Cybercrime·Data Security

    Confidential Computing – Safe from prying eyes

    Many companies are now putting the cloud first in their IT strategy, particularly in terms of using public cloud services. Whether that makes sense or not is open to judgment, but the trend looks like…

    Cybercrime·Data Security

    IT Security – Let’s not forget the basics

    It can become tedious writing about the same thing over and over again. But reading about the same thing happening time and time again is really bad for our blood pressure. A good example of this is…

    Data Security

    Privacy shield is riddled with holes

    It’s official: The Privacy Shield is a mess of gaping holes and was officially declared invalid in mid-July. Although the report itself has already been buried in the media, companies and…

    Cybercrime·Cybersecurity Strategy·Data Security

    Full points for DNS vulnerability SIGRed on the CVSS scale

    Sometimes finishing with 10 out of 10 points is a reason for celebration. Unfortunately, in this case, things are different. A newly discovered vulnerability in Windows DNS servers, SIGRed has…