Why even multi-factor authentication is vulnerable
Cookie theft, real-time phishing and MFA fatigue attacks threaten multi-factor authentication, which has long been considered unassailable.
Why even multi-factor authentication is vulnerable
Cookie theft, real-time phishing and MFA fatigue attacks threaten multi-factor authentication, which has long been considered unassailable.
Why even multi-factor authentication is vulnerable
Cookie theft, real-time phishing and MFA fatigue attacks threaten multi-factor authentication, which has long been considered unassailable.
Zero Trust – From buzzword to regulatory reality
Zero Trust Architecture is on everyone's lips and is slowly playing a role in regulatory requirements - in the USA, at EU level and also in Germany. Reason enough to take a closer look at Zero Trust. What does Zero Trust mean? What are the legislators planning in Washington, ...
Organizations have a choice of remote access VPNs, site-to-site VPNs, cloud VPNs, and hybrid architectures. But what are the differences?
How ChatGPT affects IT security
AI solutions also play a crucial role in IT security – both in a positive and a negative sense.
Confidential data on employee devices should not fall into the hands of others: Read our tips for securing end devices now.
How to back up your 2FA login data
2FA is much more secure than using passwords alone. However, if you lose access to your authenticator app, there is a risk of locking yourself out.
Blog archive
Missed out on our latest post or want to read more articles on IT security? We’ve got it covered in the NCP blog archive.
VPN, remote access, secure data communication, connectivity and protection against cybercrime are not new to businesses and consumers concerned with IT security, although some aspects may have become more familiar during the coronavirus pandemic. IT security and privacy are becoming ever more important in times of universal connectivity and mobility due to the flexibility of the Internet.
In our NCP blog, we want to spotlight the world of network security through expert articles, breaking news and comprehensive analysis on:
In the NCP category, you can find out more about our company and our values by getting to know the faces, team and stories behind NCP in Nuremberg.
We hope you enjoy reading our blog and look forward to your suggestions, comments and feedback.
Stay safe and secure,
The NCP blog team