Data protection and the secure authentication of customers is of enormous importance in many sectors. But in banking, especially, the customers’ trust and thus the protection of data is particularly… [Continue Reading]
Category: Web Security
Safe prevention instead of “friendly hacking” for the healthcare industry
“Hackers cripple large Swiss companies“, “Cyber attacks in Switzerland – Melani warns urgently” or “Cyber criminals plunder assets of Digitec Galaxus customers” – headlines like these have kept the media… [Continue Reading]
RegTech: A New Era of Governance, Risk and Compliance
Regulatory Technology – ‘RegTech’ – which was brought to life after the 2018 financial crisis, has evolved significantly over the past decade and moved steadily into its second phase of… [Continue Reading]
Web Access Management from the cloud
Many companies are currently busy with a strategic relocation of their applications into the cloud. At the same time, they are making their development processes increasingly agile and are focusing… [Continue Reading]
Change of direction in IT security: from prevention to improved detection and response
For a long time the consideration of IT security risks in many companies was dominated by the assumption that they themselves did not represent a worthwhile target for attackers and… [Continue Reading]
IT Leaders Reveal Their Top 5 IT Security Challenges
I reached out to a number of my LinkedIn connections recently, specifically the IT decision makers in my network. I wanted to see if they’d share with us – off… [Continue Reading]
Why it’s worth choosing a Managed Security Service Provider (MSSP)
Cyber security – why choose an MSSP? Cyber security threats and successful attacks have exploded in the last few years and since 2013, 7.1 billion data records have been breached…. [Continue Reading]
Have you heard about Gartner Peer Insights yet?
Have you heard about Gartner Peer Insights yet? In 2015 Gartner launched their ‘Gartner Peer Insights’ review platform. The platform offers software and service ratings, and reviews written by experienced… [Continue Reading]
Perfect security for web apps – an illusion?
Web applications are widespread, and the majority rely on proven open source components such as OpenSSL, the Spring Framework or projects from the Apache Software Foundation. As these are developed… [Continue Reading]
What Makes a Great Managed Security Service Provider (MSSP)
Cybersecurity has never before had such a high profile. The reasons for this are simple. Cyber security threats and successful attacks have exploded in the last few years. Since 2013,… [Continue Reading]
Digitalisation deluxe – be secure in your success
What have successful companies done differently when it comes to digitalisation? Who are the winners in digitalisation? Who are the significant losers? Digitalisation has reshuffled the deck. Those who were… [Continue Reading]
Secure Digitalisation: Luzerner Kantonalbank’s Crowdvoting Platform
Secure digitalisation in banking sector: Luzerner Kantonalbank has protected its crowdvoting platform with USP’s web application firewall Secure Entry Server®.
EU Data Protection Regulation and How It Affects Swiss Multinational Companies
Europe as a whole, in general terms at least, takes a strong stance on the privacy of individual’s data. In 1981, the 47 EU countries agreed to sign a treaty… [Continue Reading]
Future Trends and Standards in Authentication
Logging into an account has been a fundamental part of computing since the beginning. The first computer password, used at the Massachusetts Institute of Technology, back in 1963, provided a… [Continue Reading]
To Err Is To Be Human: Why Cyber Attacks Need The Human Touch
Security awareness is not enough to prevent cyber security. We must use authentication technology, live insight into potential threats and understand the human behaviour.
The Impact of GDPR On Companies Providing Web Access to Applications
New: Free In-Depth Webinar Learn how to get GDPR ready in one single step implementing risk based authentication and web-based protection from cyber-attacks. Subscribe now Personally Identifying Information (PII) has… [Continue Reading]