Authentication Is What You Do As Much As Who You Are
We’re all entirely familiar with the idea of a password. We should, we have between 6-10 that we not only use but use multiple times a day, across 90 different…
Read more
We’re all entirely familiar with the idea of a password. We should, we have between 6-10 that we not only use but use multiple times a day, across 90 different…
Read more
Artificial Intelligence (AI) and Machine Learning (ML) are two of the most hyped buzzwords in the last few years. Will they pass the peak of the Hype Cycle and deliver…
Read more
Like the story of Hansel and Gretel, following the small bits of information is often the way to find your way home, or in this case to the attack perpetrator. Security analytics…
Read more
We all know that Two Factor Authentication (2FA) is the foundation of good perimeter security—but it’s often perceived as cumbersome to use. Users want a smooth way to login, it’s…
Read more
Security is complex—customers need help and where do they get it? They typically turn to their local trusted party, their IT partner. Those trusted parties are the competent resellers all…
Read more
Networks are not what they used to be. Since the introduction of the firewall as the #1 security product to protect your business the world’s ways of working have evolved,…
Read more
How tech companies like Spotify, Skype, Clavister and others show why Sweden has the perfect conditions for tech incubation Sweden is amazing for many reasons, its healthy lifestyle and population,…
Read more
Once upon a time, state sponsored surveillance and privacy threats were the domain of the West. But as Chinese telecom infrastructure vendor Huawei shows, Asia is emerging as a formidable threat to our businesses.