Our Blog

Home / Blog

An Analysis of Dangerous Curves

An Analysis of Dangerous Curves

Some recently exposed vulnerabilities in cryptographic software highlight an old problem. Software often fails when in "exotic and rarely used configurations.” The recently-published CVE-2022-0778 vulnerability, and the related CVE-2020-0601 vulnerability, both...

The Importance of Automation in Data Classification

The Importance of Automation in Data Classification

It’s no surprise to anyone that the amount of data that exists is rapidly growing. A report by IDC predicts that by 2025, the global datasphere will have grown to 175 zettabyes. To put in perspective how much data this truly is, one zettabyte is equal to one trillion...

A True Converged Platform Starts with a Powerful Network Firewall

A True Converged Platform Starts with a Powerful Network Firewall

By John Maddison | May 04, 2022 Building and managing networks is hard. It requires specialized skills and training, especially today, when networks must be designed to automatically adapt to the constant pressures of digital acceleration. Ironically, this is one of...

Stalkerware — the threat is still there

Stalkerware — the threat is still there

Anastasia StarikovaApril 12, 2022 What is stalkerware, how widespread is the problem, and what is the relationship between domestic and digital abuse. Have you ever seen a movie or TV-show where the stalker finds out everything about their victim by means of a spying...

IT Products 

Netsparker logo
Flexera Logo
Acunetix Logo
Forcepoint Logo
Snow Logo
Ivanti Logo
Progress - ipswitch Logo
Titus Logo
Solarwinds Logo
Endpoint Protector Logo
Kaspersky Logo
Hewlett Packard Enterprise logo
Boldonjames Logo
KnowBe4 Logo

OT Products 

Flexera Logo
Ondeso Logo
Forcepoint Logo
Ivanti Logo
Progress - ipswitch Logo
Kaspersky Logo
Splunk Logo
Symantec logo
CertNexus Logo
Tenable Logo
Rapid1 Logo
Nozomi Logo
G Data Software Logo