How secure is your software supply chain?
The Log4j vulnerability has demonstrated the importance of supply chain security. In this blog post we consider the best course of action that companies can take to protect their software supply chain.
How secure is your software supply chain?
The Log4j vulnerability has demonstrated the importance of supply chain security. In this blog post we consider the best course of action that companies can take to protect their software supply chain.
Tobi’s take on secure communications: Is there such a thing as a free lunch?
As promised last time, today we are going to focus on money. You've probably read on the Internet that there are free versions of VPN clients. But what key differences are there between free and paid versions?
How 2FA works with time-based one-time passwords
Passwords are not strong enough: 2FA and time-based one-time passwords (TOTP) enhance security Plus: Online services that already support TOTP.
Tobi’s take on secure communications:Tobi tests VPNs
Today we’ll be tackling another myth about VPN. I’ll also touch on security protocols and what role they play in VPN. Today's myth is: “All VPNs offer the same protection.”
How to switch to two-factor authentication the easy way
Two-factor authentication (2FA): What you need to know before activating 2FA and what to back up.
Security and sustainability are crucial to technological innovation in digitalization
As we probably already know, innovation can take different forms: Either as continuous and incremental renewal or through disruption and shock. This second form of innovation involves risks and uncertainties, fundamentally changes processes and procedures and can lead to high ...
Tobi’s take on secure communications: – Is VPN really just for tech geeks?
It’s time for another Tobi’s take on secure communications. Now that I hope you know what a Virtual Private Network (VPN) is, today I would like to go into more depth on the myths about VPN today and I’ll also be picking up on this again in my next posts.
Blog archive
Missed out on our latest post or want to read more articles on IT security? We’ve got it covered in the NCP blog archive.
VPN, remote access, secure data communication, connectivity and protection against cybercrime are not new to businesses and consumers concerned with IT security, although some aspects may have become more familiar during the coronavirus pandemic. IT security and privacy are becoming ever more important in times of universal connectivity and mobility due to the flexibility of the Internet.
In our NCP blog, we want to spotlight the world of network security through expert articles, breaking news and comprehensive analysis on:
In the NCP category, you can find out more about our company and our values by getting to know the faces, team and stories behind NCP in Nuremberg.
We hope you enjoy reading our blog and look forward to your suggestions, comments and feedback.
Stay safe and secure,
The NCP blog team