Skip to content
Extremely Secure

Extremely Secure

Blog

  • Offer
  • Customers
  • Partners
  • Webinars
  • Downloads
  • About USP
  • Deutsch
Keeping-The-Channel-Secure
by Michael Liebi on 12. September 201627. June 2019 in Web Security

Keeping The Channel Secure: Vendor Risk Management and Cyber Security

How can businesses keep the channel secure in an age of out of control cyber threats? Learn more about vendor risk management and cyber security.

Top 5 Security Risks For Companies
by Michael Liebi on 26. August 201629. April 2020 in Web Security

Top 5 Cyber Security Risks For Companies

One of the best ways to understand any given concept is to classify it. Classification is used across many disciplines, from biology to data science. Being able to group ideas,… [Continue Reading]

Fighting Cyber-Crime with Cyber-Security
by Marc Lässer on 27. July 201627. June 2019 in Web Security

Fighting Cyber-Crime with Cyber-Security

The IT industry is famous for constantly inventing new buzzwords. Sometimes, they describe new technologies and sometimes, they are just there to show well known technologies in a new context…. [Continue Reading]

The mobile hacker
by Michael Liebi on 18. July 201629. April 2020 in Web Security

The Mobile Hacker

By 2014 there were more mobile devices than people in the world. Looking at the GSMA device tracker today, shows a world filled with almost 8 billion devices, and nearly… [Continue Reading]

Banking and Phishing - the perfect storm
by Michael Liebi on 12. July 201627. June 2019 in Web Security

Banking and Phishing: The Perfect Storm

In late 2014 a major bank cyber heist was spotted. This has become known as the infamous ‘Carbanak’ attack and may have resulted in over $1 billion being stolen from… [Continue Reading]

Privacy Issues in Modern Internet Connected Lives
by Michael Liebi on 2. June 20162. June 2016 in Web Security

Privacy Issues in Modern Internet Connected Lives

The last 20 years, the mass uptake of the Internet has significantly changed the way we communicate, work and play. It sometimes feels like our whole lives are digitized, we’ve… [Continue Reading]

Industry 4.0 and the Impact on Cybersecurity
by Michael Liebi on 25. May 201627. June 2019 in Web Security

Industry 4.0 and the Impact on Cybersecurity

The way in which technology has invaded our lives can sometimes feel overwhelming. We now carry our own small mobile computers in our pockets and bags with us everywhere –… [Continue Reading]

Is Malvertising The Cybercriminals Weapon of Choice?
by Michael Liebi on 3. May 201627. June 2019 in Web Security

Is Malvertising The Cybercriminals Weapon of Choice?

The cybercriminal is a trickster. They like to find new and novel ways of infecting our computers, to stay one step ahead of the game at all times. The Internet… [Continue Reading]

Authentication : The new perimeter
by Michael Liebi on 20. April 201627. June 2019 in Web Security

Authentication: The New Perimeter

Security is something that all of us, from C-level down are now fully aware of. This is at least in part due to the onslaught of cyber attacks over the… [Continue Reading]

IoT and Security: What Kind Of Future Awaits for New Technologies
by Michael Liebi on 29. March 201627. June 2019 in Web Security

IoT and Security: What Kind Of Future Awaits for New Technologies

When the Internet arrived we entered a new era of cyber security. The threat landscape went from one where we could manage it within the walls of the enterprise, to… [Continue Reading]

Online Identities: Innovation, Security, Privacy in the Future
by Mathias Wyss on 24. February 201627. June 2019 in Web Security

Online Identity Schemes: Innovation, Privacy, Security and the Future.

Introduction to the world of Online Identity Identity is our very essence, it is our being and it is how we communicate with the world. The fact that we now… [Continue Reading]

Security for Web Applications and Portals - 10 Best Practices
by Claudia Stucki on 9. February 20163. April 2018 in Web Security

Security for Web Applications and Portals – 10 Best Practices

Find out how modern, user-friendly yet safe online working and collaborative environments can be created for employees, customers and partners. Download our new White Paper suggesting the 10 Best Practices… [Continue Reading]

by Michael Liebi on 8. February 20168. February 2018 in Web Security

Are Emerging Start-ups the New Target for Cybercriminals?

It’s pretty well established that the impact of cybercrime activity and the mitigation of this impact through security defense costs, has become a major business expense. In 2015, the cost… [Continue Reading]

by Lincoln Hewett on 22. January 201627. June 2019 in Web Security

Holistic Identity Security: It’s Not All About the Database

The digitization of almost everything we do has become the norm. From our phone, to our TV and with the advent of the Internet of Things, even our fridge has… [Continue Reading]

Zurückschlagen: mit Verhaltensanalyse gegen Cyber-Kriminalität?
by Michael Liebi on 22. January 201629. November 2018 in Web Security

Can We Use Behavioural Analysis to Control Cyber Security?

There has been a change in the way that cybercrime is committed. In the early days of personal computing, back in the 1980s, malware threats like the infamous Brain virus,… [Continue Reading]

by Michael Liebi on 12. November 201527. June 2019 in Web Security

Using Security Insights for a New Generation Approach to Enterprise Security

In the previous articles, we’ve discussed all of the security issues that face a modern enterprise. Security was always something that was a necessary evil, something that we had to… [Continue Reading]

Posts navigation

Page 1 Page 2 Page 3

Newsletter abonnieren

Erhalten Sie alle News rund um IT Security & Cyber Security Services mit dem Newsletter von United Security Providers.


Newsletter abonnieren

 

Extremely Secure

Extremely Secure – das ist der Blog von United Security Providers. Als IT Security Spezialist schützen wir alles, was Ihnen wichtig ist: Ihre Anwendungen. Ihre Netzwerke. Ihre Geschäfte. Mit höchstem Standard aus der Schweiz.

 

Weitere Beiträge

  • To Err Is To Be Human: Why Cyber Attacks Need The Human Touch

    To Err Is To Be Human: Why Cyber Attacks Need The Human Touch

    2. November 2016
  • Digitalisation deluxe – be secure in your success

    2. November 2016
  • The mobile hacker

    The Mobile Hacker

    2. November 2016
  • Sicheres Login im Banking

    Security out and about in banking

    2. November 2016
  • Are Emerging Start-ups the New Target for Cybercriminals?

    2. November 2016
  • Privacy Issues in Modern Internet Connected Lives

    Privacy Issues in Modern Internet Connected Lives

    2. November 2016
  • IT-Sicherheit Keyvisual Segelflug

    Change of direction in IT security: from prevention to improved detection and response

    2. November 2016
  • 3. Welche Auswirkungen hat die neue EU-Datenschutzgrundverordnung auf Unternehmen, die Webzugriff für Anwendungen bieten?

    The Impact of GDPR On Companies Providing Web Access to Applications

    2. November 2016
  • Zurückschlagen: mit Verhaltensanalyse gegen Cyber-Kriminalität?

    Can We Use Behavioural Analysis to Control Cyber Security?

    2. November 2016
  • Medical device

    Safe prevention instead of “friendly hacking” for the healthcare industry

    2. November 2016

Abonnieren Sie unseren Newsletter

 

Impressum | Datenschutzerklärung

United Security Providers AG, Stauffacherstrasse 65/15, 3014 Bern


United Security Providers AG, Förrlibuckstrasse 70, 8005 Zürich

Copyright © 2023 Extremely Secure. All Rights Reserved.