News

Product and market information on the topics of threats, security and remote access VPN.

Page 2 of 17

In recent years, the term "Zero Trust" has become one of the most important buzzwords in t…

Password-only access has been outdated for some time, but some MFA methods have also come …

Business users are often unaware that even the supposedly secure MFA does not offer 100% p…

Employee devices should not be underestimated in information security, as they usually con…

Two-factor authentication is many times more secure than classic login method with a usern…

A solid cyber resilience strategy can help companies not only when they are hacked, but al…

Page 2 of 17