• The Secret to Effective Remote Access VPN Management

    more
    Cybercrime·Data Security·Internet of Things

    Hafnium is out there

    Many people thought that the SolarWinds hack couldn't be topped when it hit the news. But truth be told, just when you think things can’t get any worse, there is always another disaster waiting around…

    Cybersecurity Strategy·Internet of Things

    Information security for IoT 101

    Haven’t we got more important things to talk about than information security for IoT? Perhaps, but only because IoT has so far largely flown under the radar of many attackers. At least, apart from…

    Cybercrime·Cybersecurity Strategy

    ICS under fire: Water treatment plant hacked

    Industrial Control Systems (ICS) are like a little brother who is slow on the uptake compared to grown-up IT. Although ICS can do almost anything that IT can do, uses the same protocols and is similar…

    Cybercrime·Data Security

    The end of Emotet

    We've all pretty much gotten used to the fact that malware isn’t likely to go away any time soon. Malware only usually makes the headlines these days if it causes substantial damage or is particularly…

    Cybercrime·Data Security

    The SolarWinds Hack – Pearl Harbor without planes

    As if 2020 wasn’t unpleasant enough, the SolarWinds hack added fuel to the fire right at the end of the year. A – presumably – state-sponsored hacker group managed to break into the product…

    Cybersecurity Strategy·Data Security

    IT security in 2021: Things can always get worse

    Usually this is the spot where we make our forecasts for 2021 based on the latest press releases from IT security providers. But you might have to wait a little longer for that, at least until the…

    Cloud·Cybersecurity Strategy·Data Security

    SASE – a cloud-based model for network security beyond the data center

    SASE emerged as a new buzzword in forums and company presentations during the end of 2019. SASE, pronounced ‘Sassy’, stands for Security Access Service Edge. Put simply, it is an efficient way of…

    Cybercrime·Data Security

    Phishing is dead, long live smishing

    In fact, the title of this post is misleading, phishing is unfortunately far from being dead and buried. Cybercriminals continue to use all sorts of tricks to get their victims to click on malicious…

    Cloud·Cybercrime·Data Security

    Confidential Computing – Safe from prying eyes

    Many companies are now putting the cloud first in their IT strategy, particularly in terms of using public cloud services. Whether that makes sense or not is open to judgment, but the trend looks like…

    Cybercrime·Data Security

    IT Security – Let’s not forget the basics

    It can become tedious writing about the same thing over and over again. But reading about the same thing happening time and time again is really bad for our blood pressure. A good example of this is…