The United States’ Network Neutrality Ruling Puts a Focus on Data Management and Security.

A recent order for Internet broadband service providers adopted in February by the U.S. Federal Communications Commission may have large scale implications not only from a data management position, but also from a network security standpoint. At the very least, ruling may offset potential overhead cost escalations that the alternative may have caused for many
Continue Reading »

Access Manager 1.1: End of Life

In June 2014, Nervepoint Technologies released Access Manager 1.2; it provides a new user interface, support for multiple types of user databases, as well as a range of exciting new features. It can be seen that the Version 1.2 is now a unique product in comparison to Version 1.1. What is more, 1.2 features and
Continue Reading »

What Are SSL Certificates?

If you’re a user of Mozilla products, like Firefox or Thunderbird, you may have heard that the company will stop trusting unknown SSL certificates, citing these types of certificates are cryptographically unsafe. The type of certificates they are denying at the 1024-bit keys however, websites that have 2048-bit keys are fine and are up to
Continue Reading »

Going Phishing in Banking

The headlines can be seen everywhere: Hackers’ $1 billion bank theft may still impact consumers, JPMorgan and Other Banks Struck by Hackers, How safe are you and your bank from cyber attack? Morgan Chase warned that cyber attacks are growing every day in strength and velocity across the globe. He said, “It is going to
Continue Reading »

6 Exciting Updates From 2014

  2014 was the year of security breaches with companies one after another who were becoming victims to hackers and data breaches. The climate for 2015 looks to be the aftermath with everyone wondering what can be done to prevent such things in the future. In 2014, Nervepoint took these incidents and focused upon ensuring
Continue Reading »

Regulating IT: The Two Most Important IT Security Takeaways from Cyber Regulations

The biggest challenge facing most companies today is IT security. The seemingly endless increase in cyber-attacks and password breaches are only the tip of the iceberg. A tightening of all regulations and compliance requirements around IT Security, foreign conflicts that are now affecting the average consumer, and the increase in the number of networkable devices
Continue Reading »