Skip to content
Extremely Secure

Extremely Secure

Blog

  • Offer
  • Customers
  • Partners
  • Webinars
  • Downloads
  • About USP
  • Deutsch

Author: Michael Liebi

Michael Liebi ist Gründer und nun als Board Member bei United Security Providers tätig.

Change of direction in IT security: from prevention to improved detection and response

by Michael Liebi on 11. June 20187. September 2020
IT-Sicherheit Keyvisual Segelflug

For a long time the consideration of IT security risks in many companies was dominated by the assumption that they themselves did not represent a worthwhile target for attackers and… [Continue Reading]

What Makes a Great Managed Security Service Provider (MSSP)

by Michael Liebi on 29. June 201727. June 2019
Discover the drivers for Managed Security and learn how to identify the best choice out of so many MSSP offerings.

Cybersecurity has never before had such a high profile. The reasons for this are simple. Cyber security threats and successful attacks have exploded in the last few years. Since 2013,… [Continue Reading]

Secure Digitalisation: Luzerner Kantonalbank’s Crowdvoting Platform

by Michael Liebi on 7. February 20177. February 2017
Secure investment forecasting: Luzerner Kantonalbank's crowdvoting platform

Secure digitalisation in banking sector: Luzerner Kantonalbank has protected its crowdvoting platform with USP’s web application firewall Secure Entry Server®.

EU Data Protection Regulation and How It Affects Swiss Multinational Companies

by Michael Liebi on 15. December 201615. December 2016
EU Data Protection Regulation and How It Affects Swiss Multinational Companies

Europe as a whole, in general terms at least, takes a strong stance on the privacy of individual’s data. In 1981, the 47 EU countries agreed to sign a treaty… [Continue Reading]

Future Trends and Standards in Authentication

by Michael Liebi on 6. December 201627. June 2019
Future Trends and Standards in Authentication

Logging into an account has been a fundamental part of computing since the beginning. The first computer password, used at the Massachusetts Institute of Technology, back in 1963, provided a… [Continue Reading]

To Err Is To Be Human: Why Cyber Attacks Need The Human Touch

by Michael Liebi on 2. November 201627. June 2019
To Err Is To Be Human: Why Cyber Attacks Need The Human Touch

Security awareness is not enough to prevent cyber security. We must use authentication technology, live insight into potential threats and understand the human behaviour.

Keeping The Channel Secure: Vendor Risk Management and Cyber Security

by Michael Liebi on 12. September 201627. June 2019
Keeping-The-Channel-Secure

How can businesses keep the channel secure in an age of out of control cyber threats? Learn more about vendor risk management and cyber security.

Top 5 Cyber Security Risks For Companies

by Michael Liebi on 26. August 201629. April 2020
Top 5 Security Risks For Companies

One of the best ways to understand any given concept is to classify it. Classification is used across many disciplines, from biology to data science. Being able to group ideas,… [Continue Reading]

The Mobile Hacker

by Michael Liebi on 18. July 201629. April 2020
The mobile hacker

By 2014 there were more mobile devices than people in the world. Looking at the GSMA device tracker today, shows a world filled with almost 8 billion devices, and nearly… [Continue Reading]

Banking and Phishing: The Perfect Storm

by Michael Liebi on 12. July 201627. June 2019
Banking and Phishing - the perfect storm

In late 2014 a major bank cyber heist was spotted. This has become known as the infamous ‘Carbanak’ attack and may have resulted in over $1 billion being stolen from… [Continue Reading]

Privacy Issues in Modern Internet Connected Lives

by Michael Liebi on 2. June 20162. June 2016
Privacy Issues in Modern Internet Connected Lives

The last 20 years, the mass uptake of the Internet has significantly changed the way we communicate, work and play. It sometimes feels like our whole lives are digitized, we’ve… [Continue Reading]

Industry 4.0 and the Impact on Cybersecurity

by Michael Liebi on 25. May 201627. June 2019
Industry 4.0 and the Impact on Cybersecurity

The way in which technology has invaded our lives can sometimes feel overwhelming. We now carry our own small mobile computers in our pockets and bags with us everywhere –… [Continue Reading]

Is Malvertising The Cybercriminals Weapon of Choice?

by Michael Liebi on 3. May 201627. June 2019
Is Malvertising The Cybercriminals Weapon of Choice?

The cybercriminal is a trickster. They like to find new and novel ways of infecting our computers, to stay one step ahead of the game at all times. The Internet… [Continue Reading]

Authentication: The New Perimeter

by Michael Liebi on 20. April 201627. June 2019
Authentication : The new perimeter

Security is something that all of us, from C-level down are now fully aware of. This is at least in part due to the onslaught of cyber attacks over the… [Continue Reading]

IoT and Security: What Kind Of Future Awaits for New Technologies

by Michael Liebi on 29. March 201627. June 2019
IoT and Security: What Kind Of Future Awaits for New Technologies

When the Internet arrived we entered a new era of cyber security. The threat landscape went from one where we could manage it within the walls of the enterprise, to… [Continue Reading]

Are Emerging Start-ups the New Target for Cybercriminals?

by Michael Liebi on 8. February 20168. February 2018

It’s pretty well established that the impact of cybercrime activity and the mitigation of this impact through security defense costs, has become a major business expense. In 2015, the cost… [Continue Reading]

Posts navigation

Page 1 Page 2

Newsletter abonnieren

Erhalten Sie alle News rund um IT Security & Cyber Security Services mit dem Newsletter von United Security Providers.


Newsletter abonnieren

 

Extremely Secure

Extremely Secure – das ist der Blog von United Security Providers. Als IT Security Spezialist schützen wir alles, was Ihnen wichtig ist: Ihre Anwendungen. Ihre Netzwerke. Ihre Geschäfte. Mit höchstem Standard aus der Schweiz.

 

Weitere Beiträge

  • 3. Welche Auswirkungen hat die neue EU-Datenschutzgrundverordnung auf Unternehmen, die Webzugriff für Anwendungen bieten?

    The Impact of GDPR On Companies Providing Web Access to Applications

    18. October 2016
  • Web Access Management from the cloud

    18. October 2016
  • IoT and Security: What Kind Of Future Awaits for New Technologies

    IoT and Security: What Kind Of Future Awaits for New Technologies

    18. October 2016
  • What Cybercriminals Want: Company Data

    18. October 2016
  • Online Identities: Innovation, Security, Privacy in the Future

    Online Identity Schemes: Innovation, Privacy, Security and the Future.

    18. October 2016
  • Discover the drivers for Managed Security and learn how to identify the best choice out of so many MSSP offerings.

    What Makes a Great Managed Security Service Provider (MSSP)

    18. October 2016
  • Authentication : The new perimeter

    Authentication: The New Perimeter

    18. October 2016
  • Perfect security for web apps – an illusion?

    Perfect security for web apps – an illusion?

    18. October 2016
  • Security for Web Applications and Portals - 10 Best Practices

    Security for Web Applications and Portals – 10 Best Practices

    18. October 2016
  • Future Trends and Standards in Authentication

    Future Trends and Standards in Authentication

    18. October 2016

Abonnieren Sie unseren Newsletter

 

Impressum | Datenschutzerklärung

United Security Providers AG, Stauffacherstrasse 65/15, 3014 Bern


United Security Providers AG, Förrlibuckstrasse 70, 8005 Zürich

Copyright © 2023 Extremely Secure. All Rights Reserved.