top of page


How IT security trends shape your Next-Gen Firewall requirements
Being on the market for more than 10 years, the Next-Generation Firewall (NGFW) is not so much "next-gen" anymore. However, a...
May 4, 2023


U.S. T-mobile reports another data breach
A lack of situational awareness can prolong the amount of time a threat actor operates undetected inside a network. This in turn allows...
May 4, 2023

Chrome vulnerabilities underscore the need for modern endpoint protection
Recent critical bugs in Google Chrome underscore the importance of endpoint protection based on EDR technology.
Apr 24, 2023


Bypassing mobile push authentication - an example
Out-of-band multifactor authentication (MFA) such as mobile push is now routinely exploited, as witnessed in recent attacks against...
Mar 14, 2023


Ransomware demands decline?
Better security and law enforcement driving ransom demands lower and making ransomware less successful?
Feb 27, 2023

Fresh vulnerabilities exploited in the wild
Most are Microsoft related, but the Apple Webkit bug is a true novelty, perhaps implying iPhone spyware delivered via malicious web content.
Feb 15, 2023


Old Windows vulnerability re-used in modern attacks
Microsoft is republishing an old Windows vulnerability from 2013, apparently now exploited.
Feb 1, 2023


API breach at T-Mobile
37 million customer records exposed in breach at T-mobile, highlighting the issues with API security.
Jan 31, 2023


SASE architecture - better aligned with modern scenarios
One more buzzword or acronym if you will: Secure Access Service Edge (SASE). Analysts expect it to reach a 15B USD opportunity with a...
Jan 17, 2023
bottom of page