Public sector cloud adoption growing, obstacles remain
top of page


Interesting results from the IDG survey "Public sector digital transformation" co-sponsored by HPE and AMD. The survey was conducted in...


- Jun 1
Staying hidden - the name of the game
A threat actor uses built-in legitimate network administration tools to infiltrate critical infrastructure companies across the world.

- May 25
Is antimalware needed on Vmware ESXi hypervisor?
Crowdstrike vs Vmware debate In its recent blog, Crowdstrike outlines the long history of Ransomware-as-a-service operators targeting...


- May 22
Multifactor authentication is evolving - time to catch up!
The multifactor authentication (MFA) most commonly used in organizations today is relying on smartphone applications that provide push...

- May 19
GDPR enforcement: focus on data-at-rest encryption
It seems the Croatian Data Protection Agency (AZOP) is on a streak: after the record fine imposed on a debt collection agency earlier...


- May 18
Microsoft introducing MFA number matching
Recognizing the recent vulnerabilities of existing mobile push multifactor authentication schemes, Microsoft is rolling out "number...

- May 15
Quickly gain situational awareness and visibility into your network environment
We all know visibility is the key to prevent breaches: gaining situational awareness focused on network traffic is usually a great way to...

- May 10
The largest GDPR fine in Croatia so far
On GDPR's 5th anniversary, the Croatian data protection authority (DPA) has issued the biggest fine in terms of GDPR violation so far:...


- May 4
How IT security trends shape your Next-Gen Firewall requirements
Being on the market for more than 10 years, the Next-Generation Firewall (NGFW) is not so much "next-gen" anymore. However, a...


- May 4
U.S. T-mobile reports another data breach
A lack of situational awareness can prolong the amount of time a threat actor operates undetected inside a network. This in turn allows...

- Apr 24
Chrome vulnerabilities underscore the need for modern endpoint protection
Recent critical bugs in Google Chrome underscore the importance of endpoint protection based on EDR technology.


- Mar 14
Bypassing mobile push authentication - an example
Out-of-band multifactor authentication (MFA) such as mobile push is now routinely exploited, as witnessed in recent attacks against...


- Feb 27
Ransomware demands decline?
Better security and law enforcement driving ransom demands lower and making ransomware less successful?

- Feb 15
Fresh vulnerabilities exploited in the wild
Most are Microsoft related, but the Apple Webkit bug is a true novelty, perhaps implying iPhone spyware delivered via malicious web content.


- Feb 1
Old Windows vulnerability re-used in modern attacks
Microsoft is republishing an old Windows vulnerability from 2013, apparently now exploited.
bottom of page