Ringing in Archer?s Next Chapter with a New Identity

| | archer, Customers, SBN News, strategy
Archer charts a new independent course with a new identity, same customer focus ...

COVID-19 Pandemic Shapes and Accelerates the Future of Work

When 2020 began, many companies were engaged in or at least considering digital transformation. The COVID-19 pandemic and overnight shift to entire organizations working remotely from home as we struggle to contain ...

Why Zero Trust reflects today’s challenges

Since Covd-19 started, I probably talked more about Zero Trust than ever before. Not that the concept is new, but the pressure to apply it, suddenly increased dramatically with all the users ...

Hackers don’t break in – they log in

We talked about this very often so far: Passwords are by far the weakest link when it comes to security today. 81% of successful attacks involve lost, breached or re-used passwords. There ...

Intel Bug Bounty Program Improves Security and Drives Community Engagement

Intel is a sponsor of TechSpective Vulnerabilities are a fact of life. Organizations and developers strive to develop secure code, but the reality is that there is no such thing as perfect ...
Microsoft Teams Controls for Security and Compliance tutorial

Secure Working from Home – Some Ideas and Guidance

There is plenty of information out there how to secure a “Home Office” environment in these days and I do not want this to be another one. However, I tried to compile ...

Secure Virtual Coffee – Top of Mind?

< Deutsch weiter unten> Yes, I am sitting in my Home Office – as you might these days. Maybe the difference is that I am more or less used to this situation, ...
9 Mistakes Your B2B Business Website Is Making

9 Mistakes Your B2B Business Website Is Making

When you first start your company, you just want to get a website up and running and get the word out about what you do. However, it’s easy to make mistakes in ...

HP Moves to Increase Desktop and Printer Security Lead with Bromium

HP just announced the acquisition of Bromium, a unique small security company. I must admit the name “Bromium” kind of sounds like something you’d take if you had a stomach problem, but ...

How to leverage “Secure Access Workstations” for the Cloud

This is a questions I get fairly often. But before I try to answer, let’s take a step back: We know that attackers typically try to compromise user accounts and then move ...