How protection against MFA attacks works
Not all MFA procedures are equally safe. We help you choose the most secure method for multi-factor authentication.
How protection against MFA attacks works
Not all MFA procedures are equally safe. We help you choose the most secure method for multi-factor authentication.
How protection against MFA attacks works
Not all MFA procedures are equally safe. We help you choose the most secure method for multi-factor authentication.
Demystifying Secure Access Service Edge (SASE)
Secure Access Service Edge is on everyone’s lips, but hardly anyone knows what it means exactly. We show the role SASE plays in protecting modern networks.
How FIDO2 affects the future of MFA
FIDO2 is considered the future of secure authentication. Learn what speaks for this standard and how it compares to the TOTP method.
Why even multi-factor authentication is vulnerable
Cookie theft, real-time phishing and MFA fatigue attacks threaten multi-factor authentication, which has long been considered unassailable.
Zero Trust – From buzzword to regulatory reality
Zero Trust Architecture is on everyone's lips and is slowly playing a role in regulatory requirements - in the USA, at EU level and also in Germany. Reason enough to take a closer look at Zero Trust. What does Zero Trust mean? What are the legislators planning in Washington, ...
Organizations have a choice of remote access VPNs, site-to-site VPNs, cloud VPNs, and hybrid architectures. But what are the differences?
Blog archive
Missed out on our latest post or want to read more articles on IT security? We’ve got it covered in the NCP blog archive.
VPN, remote access, secure data communication, connectivity and protection against cybercrime are not new to businesses and consumers concerned with IT security, although some aspects may have become more familiar during the coronavirus pandemic. IT security and privacy are becoming ever more important in times of universal connectivity and mobility due to the flexibility of the Internet.
In our NCP blog, we want to spotlight the world of network security through expert articles, breaking news and comprehensive analysis on:
In the NCP category, you can find out more about our company and our values by getting to know the faces, team and stories behind NCP in Nuremberg.
We hope you enjoy reading our blog and look forward to your suggestions, comments and feedback.
Stay safe and secure,
The NCP blog team