Why even multi-factor authentication is vulnerable
Cookie theft, real-time phishing and MFA fatigue attacks threaten multi-factor authentication, which has long been considered unassailable.
Secure, flexible, scalable: VPN infrastructure is essential in modern IT environments and not just to support the trend towards remote working in an increasingly connected world. Sophisticated endpoint policies can help companies to protect their infrastructure from cyber threats. Security features such as two-factor authentication can also provide additional security, both in consumer and professional environments. Innovations in communication technology and secure remote access have established entirely new sectors such as Industrial Control, Smart City or Edge applications. Stay up to date with our comprehensive news coverage and background reports on the latest VPN developments.
Why even multi-factor authentication is vulnerable
Cookie theft, real-time phishing and MFA fatigue attacks threaten multi-factor authentication, which has long been considered unassailable.
Zero Trust – From buzzword to regulatory reality
Zero Trust Architecture is on everyone's lips and is slowly playing a role in regulatory requirements - in the USA, at EU level and also in Germany. Reason enough to take a closer look at Zero Trust. What does Zero Trust mean? What are the legislators planning in Washington, ...
Organizations have a choice of remote access VPNs, site-to-site VPNs, cloud VPNs, and hybrid architectures. But what are the differences?
How ChatGPT affects IT security
AI solutions also play a crucial role in IT security – both in a positive and a negative sense.
Confidential data on employee devices should not fall into the hands of others: Read our tips for securing end devices now.
How to back up your 2FA login data
2FA is much more secure than using passwords alone. However, if you lose access to your authenticator app, there is a risk of locking yourself out.
Blog archive
Missed out on our latest post or want to read more articles on IT security? We’ve got it covered in the NCP blog archive.