Cookie theft, real-time phishing and MFA fatigue attacks threaten multi-factor authentication, which has long been considered unassailable.
Everyone who can, works from home every now and then. Maybe even for a few weeks or months from a wonderful lighthouse in the Azores. The only thing that might spoil it is an IT security problem or cybercriminals wanting to make friends. That could ruin my day. What about you?
The first Virtual Private Networks (VPNs) were designed 30 years ago. VPNs have evolved from older protocols such as swipe and PPTP to IPsec and wireguard.
In 2023, IT security experts will finally meet again at trade fairs and conferences. Here are the dates of the most important IT security events.
The trend is shifting towards SAML Single Sign On: Users can log in securely to several services with just one account.
Today we would like to welcome as our guests four women from our internal sales team. When you step into their office, it is clear that Anna, Daniela, Janine and Martina are a well-established team who also get along well outside of work.
Zero Trust differs from conventional security concepts in some respects. But when does that make sense and what role do SASE, ZTNA and SSE play?
Please select a year.