Double extortion ransomware: a growing threat to businesses
Double Extortion – first data theft, then encryption. Discover how to protect your company from the dual threat of ransomware extortion.
Secure, flexible, scalable: VPN infrastructure is essential in modern IT environments and not just to support the trend towards remote working in an increasingly connected world. Sophisticated endpoint policies can help companies to protect their infrastructure from cyber threats. Security features such as two-factor authentication can also provide additional security, both in consumer and professional environments. Innovations in communication technology and secure remote access have established entirely new sectors such as Industrial Control, Smart City or Edge applications. Stay up to date with our comprehensive news coverage and background reports on the latest VPN developments.
Double extortion ransomware: a growing threat to businesses
Double Extortion – first data theft, then encryption. Discover how to protect your company from the dual threat of ransomware extortion.
IPsec VPN vs. SSL VPN: Choosing the right solution for your business
IPsec VPN delivers advanced security at the network layer. Discover the key advantages of IPsec VPNs over SSL VPNs, especially for hybrid work environments and Zero Trust architectures.
Shadow AI: How AI tools are compromising company data
ChatGPT and other AI tools are sneaking their way into companies and threatening data security and compliance. Learn how to protect your company from Shadow AI.
How deepfake attacks threaten your identity management
Deepfake CFO loots millions: Learn how authentication practices and Zero Trust architectures protect your IAM from AI fraud.
SIEM and SOAR: Which system does your business need?
The perfect combination for enhanced IT security in your business: SIEM detects cyber threats, SOAR automatically fends them off.
Hybrid Work Security: Making remote work more secure
Remote working requires a modern security strategy. Discover how VPN solutions with SD-WAN, SASE, and Zero Trust optimally secure distributed teams and data.
Blog archive
Missed out on our latest post or want to read more articles on IT security? We’ve got it covered in the NCP blog archive.