We've all pretty much gotten used to the fact that malware isn’t likely to go away any time soon. Malware only usually makes the headlines these days if it causes substantial damage or is particularly severe. During the coronavirus pandemic, we’ve mostly heard about malware ...
Posts of category: IT Security
IT security is a critical asset for companies and authorities in 2021 – after all securing data communication affects the most important business activities and services across an organization. With the demand for remote and mobile working at an all-time high, organizations need to act strategically on endpoint security and IT administration to protect their networks and sensitive data. Cybersecurity is the spearhead of any IT infrastructure and needs to be considered strategically from the outset – from cloud computing, data center operations and IIoT to regulated industries or health applications. Find out everything you need to know about the world of IT security.
The SolarWinds Hack – Pearl Harbor without planes
As if 2020 wasn’t unpleasant enough, the SolarWinds hack added fuel to the fire right at the end of the year. A – presumably – state-sponsored hacker group managed to break into the product repositories of the software manufacturer SolarWinds...
IT security in 2021: Things can always get worse
Usually this is the spot where we make our forecasts for 2021 based on the latest press releases from IT security providers. But you might have to wait a little longer for that, at least until the second half of this post. Right now, the SolarWinds hack has stolen the show. ...
SASE – a cloud-based model for network security beyond the data center
SASE emerged as a new buzzword in forums and company presentations during the end of 2019. SASE, pronounced ‘Sassy’, stands for Security Access Service Edge. Put simply, it is an efficient way of combining management and security functions in the cloud and existing data centers ...
Phishing is dead, long live smishing
In fact, the title of this post is misleading, phishing is unfortunately far from being dead and buried. Cybercriminals continue to use all sorts of tricks to get their victims to click on malicious links or malware. A recent study by OpenText into phishing/scam emails and cyber ...
Confidential Computing – Safe from prying eyes
Many companies are now putting the cloud first in their IT strategy, particularly in terms of using public cloud services. Whether that makes sense or not is open to judgment, but the trend looks like it is here to stay. To date, however, there have been a few no-go areas for ...
Blog archive
Missed out on our latest post or want to read more articles on IT security? We’ve got it covered in the NCP blog archive.