The Log4j vulnerability has demonstrated the importance of supply chain security. In this blog post we consider the best course of action that companies can take to protect their software supply chain.
As promised last time, today we are going to focus on money. You've probably read on the Internet that there are free versions of VPN clients. But what key differences are there between free and paid versions?
Passwords are not strong enough: 2FA and time-based one-time passwords (TOTP) enhance security Plus: Online services that already support TOTP.
Today we’ll be tackling another myth about VPN. I’ll also touch on security protocols and what role they play in VPN. Today's myth is: “All VPNs offer the same protection.”
Two-factor authentication (2FA): What you need to know before activating 2FA and what to back up.
As we probably already know, innovation can take different forms: Either as continuous and incremental renewal or through disruption and shock. This second form of innovation involves risks and uncertainties, fundamentally changes processes and procedures and can lead to high ...
It’s time for another Tobi’s take on secure communications. Now that I hope you know what a Virtual Private Network (VPN) is, today I would like to go into more depth on the myths about VPN today and I’ll also be picking up on this again in my next posts.
Please select a year.