Blog
Our expertise for your business
Blog articles which deliver valuable insights into the topics Identity & Access Management and Cybersecurity
What matters when implementing multi-factor authentication
With a strong authentication mechanism, more than 9 out of 10 attacks can be defended against. This is now widely known and undisputed. Every day, we access systems that require a username and password. The high-profile hacks and data breaches of the past few years...
Expert knowledge: Cyber resilience through Identity Management
Cyber-attack methods and their consequences are becoming increasingly more sophisticated, and are horrifying stories for companies of all sizes. It is essential to increase the defense against them and this can be done through a variety of means. One of the most...
How to become a Zero Trust Champion
It's about IAM, not passwords When it comes to cyber security, Zero Trust is hard to miss. The concept is at the heart of many organizations today and is far more than just a buzzword. Almost every aspect of a business has to do with it. However, there is one...
General knowledge: Strengthening trust through Digital Identity Management
How your organization combines Identity Management and digital trust (and why it's needed now more than ever) Every minute of every day, our world is becoming more digitised. In many areas, we are virtually dependent on digital services because they determine and...
Basic knowledge: Zero Trust security model
Zero Trust: The security model you should (not?) implement now Do you trust us? Or do we trust you? Zero Trust means never trust, but always verify. This is probably only of limited use as a life philosophy, but it could look different in IT. Let's take a look. Behind...
Basic knowledge: The digital identity
How Identity and Access Management gets the digital transformation off the ground For some time now, all we have been hearing about is digital identity and digitalization. There is no business magazine that doesn’t write about it and no successful company that doesn’t...
SUPPORT – RULES OR HUMANITY?
SUPPORT - RULES OR HUMANITY? As an individual customer, small companies still receive very good support and support. But when companies grow, more and more “rules” are introduced, which all employees have to implement without discussion. Companies are trying more and...
30 years of SKyPRO
30 years of SKyPRO 10,000 years is a tiny span of time in the history of our universe. In contrast, 30 years in IT is a very long time. SKyPRO AG was officially founded on April 6, 1987. It is not a matter of course that a company has existed in our industry for over...
Thoughts in a time of change
Thoughts in a time of change It's a strange time we're living in right now. Refugees, zero interest rates, Erdogan, Trump ... everything is extremely strange. Globalization has become unpopular. First came the growth of the international trade in goods, now also the...
The Internet of Tears or “WannaCry”
The Internet of Tears or “WannaCry” From the point of view of IT security, May 2017 is a very intense month. The ransom or malware “WannaCry” paralyzed many systems within a very short time on Friday, May 12th. Ransomware or encryption trojans are malicious programs...