DeCrypted Blog

The Art of Cyberwar

2 500 years ago, the general and military strategist Sun Tzu wrote the book The Art of War. It is a classic...
Read More

World Password Day Signals Perfect Time to Reveal Clavister EasyAccess 3.2

By Kate Linwood / 2020-05-13
Each year on the first Thursday in May, World Password Day promotes better password habits. Passwords are critical gatekeepers of our...
Read More

How to Remote Work Like a Boss

By Kate Linwood / 2020-04-15
With remote working becoming our new normal, there are a few things you need to do to be safe and...
Read More

How Tech Will Beat COVID-19

By Kate Linwood / 2020-04-02
With medical research desperately searching for a cure to the Corona crisis, what may be our best hope in the...
Read More

How protected are you?

By Kate Linwood / 2020-02-27
From the biggest banks to your company’s network, having an overview of security helps you see the obvious points of...
Read More

Scorecarding in the Age of Threat

By Kate Linwood / 2020-02-27
There’s no lack of cybersecurity scorecards, but before choosing one, consider the following. Cybersecurity scorecarding has been an aspect of the security...
Read More

First You Secure, Then You Score!

You know the feeling—you put on your seatbelt and just pull it one quick time to make sure it locks....
Read More

Looking Into The Future: Trends in Identity & Access Management

By Kate Linwood / 2020-01-30
Identity & Access Management is a very hot segment of the market right now. Specifically access management—as everyone has truly...
Read More

Authentication Is What You Do As Much As Who You Are

We're all entirely familiar with the idea of a password. We should, we have between 6-10 that we not only...
Read More

The New Threat Is You

By John Vestberg, CEO / 2020-01-14
How cybersecurity has Evolved: a View from the Trenches. Sometimes I hear the words ’20 years in the business’ and...
Read More

Seeing the Wolf in the Herd: Analytics In the Age of Ransomware

By Kate Linwood / 2019-12-31
In 2019, one of the most severe ransomware attacks ever reported happened to a Scandanavian aluminium supplier, costing almost €75...
Read More

Will Artificial Intelligence improve security in 2020?

Artificial Intelligence (AI) and Machine Learning (ML) are two of the most hyped buzzwords in the last few years. Will...
Read More

Efficient operations—Using Security Analytics to optimize your user’s experience 

By Kate Linwood / 2019-12-10
Efficiency often means synergies and savings. It means making good use of resources—both operational manpower, bandwidth and energy—but also time...
Read More

Follow the breadcrumbs

Like the story of Hansel and Gretel, following the small bits of information is often the way to find your way home,...
Read More

What you don’t know, does hurt you!

You can read about cyberattacks in the news almost every day. Security is on top of the agenda at most...
Read More

Clavister’s Keynote at SDN NFV World Congress – 2019

By Kate Linwood / 2019-11-11
In the end of October Clavister had the opportunity to present a keynote at the SDN NFV World Congress in...
Read More

FBI Warns of Multi Factor Authentication SMSs Being Vulnerable

By Kate Linwood / 2019-10-31
Instead, they advise Biometrics as the new base line for authentication. Multi-Factor-Authentication (MFA) has been under attack recently by prominent...
Read More

The Future of Network Security Is in the Cloud – Introducing Elastic Secure SD-WAN

By Kate Linwood / 2019-10-25
Security needs are evolving quickly. Twenty years ago, it was enough with a firewall at your network door—ten years ago...
Read More

Smart Networks with Edge Computing – How to Achieve Robust Security?

Some datacenter functions are moving closer to the user, to the edge of the networks. Welcome to the world of...
Read More

Is 5G more secure than 4G?

It’s a fact: there’s a growing buzz around 5G right now as carriers start to launch their first services. But...
Read More