Microsoft Teams Controls for Security and Compliance tutorial

Secure Working from Home – Some Ideas and Guidance

There is plenty of information out there how to secure a “Home Office” environment in these days and I do not want this to be another one. However, I tried to compile ...

Secure Virtual Coffee – Top of Mind?

< Deutsch weiter unten> Yes, I am sitting in my Home Office – as you might these days. Maybe the difference is that I am more or less used to this situation, ...

Protection against Magecart with new Instart Web Skimming Protection for Salesforce Commerce Cloud

| | Products, web skimming
Salesforce Commerce Cloud, also known as Demandware, is used by some of the worlds largest brands for marketing, customer interaction, and to process online shopping transactions. Given the importance of the platform, ...

Don’t suffer from a data breach over the holidays: Protect your website at no cost for 30 days

| | Products, threats, web skimming
Protect your website at no cost for 30 days during the most active attack period with Instart Web Skimming Protection ...

Protect your private data this holiday season: Announcing Privacy Alert by Instart — a new Chrome plugin for better browser security

Ever wonder who can see the information you enter on a website? Is it just the website or can other companies see it, such as the provider of the live chat on ...
Crytic: Continuous Assurance for Smart Contracts

Crytic: Continuous Assurance for Smart Contracts

Note: This blog has been reposted from Truffle Suite’s blog. We are proud to announce our new smart contract security product: https://crytic.io/. Crytic provides continuous assurance for smart contracts. The platform reports ...

Make No Mistake — Microsoft Is A Security Company Now

That’s not a bad start of the day, reading such a headline from a Forrester analyst. I am often asked, how far we are going to drive security within Microsoft. Well, I ...

Confidential Computing – A Silver Bullet for the Cloud?

When it comes to encryption and data we solved different problems. Since the invention of algorithms like DES, 3DESand/or AES symmetric encryption is something we understand and can solve. With RSA and ...