BASEFARM POSITIONERAR SIG ÅTERIGEN SOM EN LEDANDE NORDISK SOURCINGLEVERANTÖR
maj 2, 2022/av johan_kanHur man optimerar molnet med WAF
februari 25, 2022/av johan_kanCloud: helping COOs deal with an unprecedented level of change
februari 4, 2022/av johan_kanCloud becomes essential to accelerate digital business initiatives
februari 4, 2022/av johan_kanCloud can help relieve the digital pressure on CIOs
februari 4, 2022/av johan_kanEkonomiska Effekter med Public Cloud
januari 28, 2022/av johan_kanKOSTNADSKONTROLL I EN TID AV MULTICLOUD OCH ”CLOUD NATIVE”
december 3, 2021/av johan_kanDetta lockar särskilt många företag i molnet
oktober 29, 2021/av johan_kanDet är en resa – inte en destination
augusti 30, 2021/av johan_kanLys upp vägen till framgång
augusti 30, 2021/av johan_kanSkydda din organisation mot ransomware
juli 7, 2021/av johan_kanGAIA X
juni 30, 2021/av johan_kanSchrems II implications
juni 30, 2021/av johan_kanBoosta era intäktsströmmar
maj 4, 2021/av johan_kanInnovation och IT-utveckling
maj 4, 2021/av johan_kanKunderna nöjda med Basefarm visar årets Whitelane-rapport
april 21, 2021/av johan_kanKickstarta er digitala strategi
mars 30, 2021/av johan_kanDärför är molntjänster avgörande för framtidens vård
februari 5, 2021/av johan_kan4 steg till en flexibel IT-leverans för transportbranschen
februari 5, 2021/av johan_kanÖPPNA UPP CLOUD-NATIVE-VÄRLDEN
februari 4, 2021/av johan_kanMöjligheter med multicloud
februari 3, 2021/av johan_kan4 steg till en flexibel IT-leverans
januari 28, 2021/av johan_kanDE VANLIGASTE FRÅGORNA OM DIGITAL TRANSFORMATION
oktober 19, 2020/av johan_kanVi är mitt i en digital revolution!
september 30, 2020/av johan_kanVad är AWS?
september 28, 2020/av johan_kanVad är Microsoft Azure?
september 28, 2020/av johan_kanSå kan tekniken hjälpa företag att återgå till fungerande verksamhet
juli 22, 2020/av johan_kanGOD GOVERNANCE FÖR FRAMGÅNG VID DIGITAL OMVANDLING
juli 22, 2020/av johan_kanUtbildningsdirektoratet ger Basefarm examensansvar
juni 2, 2020/av johan_kanTack för visat förtroende – tillsammans kan vi nå nya höjder!
maj 8, 2020/av johan_kanIT är viktigare än någonsin – så täcker företagen upp
mars 25, 2020/av johan_kanMolnet – driver företaget på distans
mars 23, 2020/av johan_kanDu är inte ensam – #vitecherupp
mars 18, 2020/av johan_kanThe State of Breach Protection 2020
mars 9, 2020/av johan_kanNew year, new vulnerabilities
mars 9, 2020/av johan_kanBasefarm security news
mars 9, 2020/av johan_kanSecurity Software & Tools Tips – December 2019
mars 9, 2020/av johan_kanThreat Hunting or Efficiency: Pick Your EDR Path?
mars 9, 2020/av johan_kanData leaks and breaches
mars 9, 2020/av johan_kanVisa Warns of New JavaScript Skimmer ’Pipka’
mars 9, 2020/av johan_kanInsider threats
mars 9, 2020/av johan_kanHappy Birthday, CVE!
mars 9, 2020/av johan_kanSecurity Software & Tools Tips – November 2019
mars 9, 2020/av johan_kanNation state actors plays the long game
mars 9, 2020/av johan_kanReality Check: The Story of Cybersecurity
mars 9, 2020/av johan_kanCVE-2020-0688 | Microsoft Exchange Validation Key Remote Code Execution Vulnerability
mars 9, 2020/av johan_kanCVE-2020-1938 – Apache Tomcat AJP Request Injection and potential Remote Code Execution
mars 9, 2020/av johan_kanBasefarm security news
mars 9, 2020/av johan_kanCVE-2020-3158 – Cisco Smart Software Manager On-Prem Static Default Credential Vulnerability
mars 9, 2020/av johan_kanVMSA-2020-0003 vRealize Operations for Horizon Adapter updates address multiple security vulnerabilities (CVE-2020-3943, CVE-2020-3944, CVE-2020-3945)
mars 9, 2020/av johan_kanThemeREX Addons – Remote Code Execution (0day, Being Exploited)
mars 9, 2020/av johan_kanCVE-2020-0618 | Microsoft SQL Server Reporting Services Remote Code Execution Vulnerability
mars 9, 2020/av johan_kanCloud security is voodoo?
mars 9, 2020/av johan_kanVulnerable Citrix Appliances
mars 9, 2020/av johan_kanThe State of Breach Protection 2020
mars 9, 2020/av johan_kanNew year, new vulnerabilities
mars 9, 2020/av johan_kanBasefarm security news
mars 9, 2020/av johan_kanSecurity Software & Tools Tips – December 2019
mars 9, 2020/av johan_kanThreat Hunting or Efficiency: Pick Your EDR Path?
mars 9, 2020/av johan_kanData leaks and breaches
mars 9, 2020/av johan_kanVisa Warns of New JavaScript Skimmer ’Pipka’
mars 9, 2020/av johan_kanInsider threats
mars 9, 2020/av johan_kanHappy Birthday, CVE!
mars 9, 2020/av johan_kanSecurity Software & Tools Tips – November 2019
mars 9, 2020/av johan_kanGrön strategi 2020 – låt molnet visa vägen
december 13, 2019/av johan_kan5 tips for better cloud security
oktober 25, 2019/av johan_kanHistoriska data räcker inte för att ta bra beslut
september 5, 2019/av johan_kanSecurity Software & Tools Tips – February 2019
februari 28, 2019/av stefan mansbyMicrosoft IIS DoS, patch install not enough
februari 22, 2019/av hans-petter fjeldDowngrade Attack on TLS 1.3 and Vulnerabilities in Major TLS Libraries
februari 8, 2019/av stefan mansbyMulti-factor authentication time?
februari 1, 2019/av trond hagenHow to improve control and save cost with Service Organization Controls (SOC) reports.
januari 30, 2019/av esten hoelUnprotected Government Server Exposes Years of FBI Investigations
januari 25, 2019/av fredrik svantesGive Up the Ghost: A Backdoor by Another Name
januari 11, 2019/av stefan mansbySecurity Software & Tools Tips – January 2019
januari 9, 2019/av stefan mansbyEU launches bug bounty programs for 15 software
januari 4, 2019/av trond hagenWhat is the Australian Anti-Encryption Bill?
december 14, 2018/av fredrik svantesWhat is a Security Operations Center and why do you need it?
december 11, 2018/av fredrik svantes4 Industries That Have to Fight the Hardest Against Cyberattacks
december 7, 2018/av trond hagenDNSpionage and how to mitigate DNS tunneling
november 30, 2018/av hans-petter fjeldThought you deleted your iPhone photos?
november 16, 2018/av stefan mansby258,000 encrypted IronChat phone messages cracked by police
november 9, 2018/av stefan mansbyRussia accused of Energy Sector Siege
november 2, 2018/av hans-petter fjeldRiskminimering
oktober 30, 2018/av johan_kanKan Australien visa vägen för ett digitalt säkrare Sverige
oktober 30, 2018/av johan_kanBF-SIRT Newsletter 2018-02
oktober 5, 2018/av johan_kanSecurity Software & Tools Tips – October 2018
oktober 5, 2018/av johan_kanWhy use a Managed Service Provider for Amazon Web Services
oktober 5, 2018/av johan_kanHackers Turn to Python as Attack Coding Language of Choice
oktober 5, 2018/av johan_kanCIOs don’t know what DevOps is
oktober 5, 2018/av johan_kanThousands of breached websites turn up on MagBo Black market
oktober 5, 2018/av johan_kan3 takeaways from SQLSaturday in Oslo
oktober 5, 2018/av johan_kanBlocking cyber attacks; Why you should understand adversary playbooks
oktober 5, 2018/av johan_kanCheck for the Security-First Mindset Across All Teams
oktober 5, 2018/av johan_kanHow to move mountains – our road to continuous delivery
oktober 5, 2018/av johan_kanAn app in a day
oktober 5, 2018/av johan_kanWhat we learned from DEF CON 26
oktober 5, 2018/av johan_kanSecurity is Not a One-Person Job
oktober 5, 2018/av johan_kanTLS 1.3 – Internet Security Gets a Boost
oktober 5, 2018/av johan_kanBF-SIRT Newsletter 2018-32
oktober 5, 2018/av johan_kanFaster time to market with automated workflow
oktober 5, 2018/av johan_kanFem säkerhetstrender att hålla koll på
oktober 5, 2018/av johan_kanHow does digital transformation actually work?
oktober 5, 2018/av johan_kanIBM PowerAI
oktober 5, 2018/av johan_kanBF-SIRT Newsletter 2018-31
oktober 5, 2018/av johan_kanAre you prepared for DDoS attacks?
oktober 5, 2018/av johan_kanLyckade IT-partnerskap – expertens 5 bästa tips
september 30, 2018/av johan_kanData is stupid; using it is clever
september 15, 2018/av johan_kanIs the finance industry afraid of the cloud?
september 14, 2018/av johan_kanSeven ways to survive the cloud
september 14, 2018/av johan_kanCloud strategy
september 14, 2018/av johan_kanBF-SIRT Newsletter 2018-01
september 14, 2018/av johan_kanBig data Olympics
september 14, 2018/av johan_kanBig Data Intro-Webinar!
september 14, 2018/av johan_kanBF-SIRT Newsletter 2018-02
september 14, 2018/av johan_kanWhere does Big Data begin? – Many perspectives, one classification
september 14, 2018/av johan_kanBF-SIRT Newsletter 2018-03
september 14, 2018/av johan_kanBF-SIRT Newsletter 2018-05
september 14, 2018/av johan_kanBF-SIRT Newsletter 2018-07
september 14, 2018/av johan_kanBF-SIRT Newsletter 2018-04
september 14, 2018/av johan_kanReady to deep dive into the data lake?
september 14, 2018/av johan_kanData thinking is the holy grail of organic growth
september 14, 2018/av johan_kanBF-SIRT Newsletter 2018-06
september 14, 2018/av johan_kanBF-SIRT Newsletter 2018-08
september 14, 2018/av johan_kanBF-SIRT Newsletter 2018-10
september 14, 2018/av johan_kanA comparison of public cloud providers: AWS, Azure, and Google. Part 2
september 14, 2018/av johan_kanA comparison of public cloud providers: AWS, Azure, and Google. Part 1
september 14, 2018/av johan_kanBF-SIRT Newsletter 2018-09
september 14, 2018/av johan_kanDon’t let big data turn us into Big Brothers
september 14, 2018/av johan_kanWhat is Big Data? – A definition with five Vs
september 14, 2018/av johan_kanMalware is so 2017: five new security trends to watch out for
september 14, 2018/av johan_kanBF-SIRT Newsletter 2018-11
september 14, 2018/av johan_kanBF-SIRT Newsletter 2018-14
september 14, 2018/av johan_kanBF-SIRT Newsletter 2018-12
september 14, 2018/av johan_kanWhat is DevOps? – A definition
september 14, 2018/av johan_kanBF-SIRT Newsletter 2018-15
september 14, 2018/av johan_kanRussian State-Sponsored Cyber Actors Targeting Network Infrastructure
september 14, 2018/av johan_kanReady to speed up your development?
september 14, 2018/av johan_kanBF-SIRT Newsletter 2018-16
september 14, 2018/av johan_kanAre you prepared for social engineering and the Next Corporate hack?
september 14, 2018/av johan_kanWhat AI and machine learning are and how they relate to IoT
september 14, 2018/av johan_kanCritical IT services need dedicated SOC for GDPR compliance
september 14, 2018/av johan_kanBalancing security in hybrid cloud environment
september 14, 2018/av johan_kan8 benefits of using Microsoft CSP for your Azure consumption
september 14, 2018/av johan_kanHow CLOUD Act influence European business
september 14, 2018/av johan_kanUnikernel technology versus Containerization
september 14, 2018/av johan_kan5 R’s for Cloud Migration
september 14, 2018/av johan_kanCloud services or managed services: What’s the difference?
september 14, 2018/av johan_kan5 IT Trends that will shape the next 5 years (Part 3): Multi Cloud & Hybrid Cloud
september 14, 2018/av johan_kan5 IT Trends that will shape the next 5 years (Part 4): Cloud Security
september 14, 2018/av johan_kanMicrosoft Azure Platform
september 14, 2018/av johan_kanSuccessful IT Partnerships
september 14, 2018/av johan_kanIntroducing Nordkap – a Swedish success story.
september 14, 2018/av johan_kanHybrid cloud for peak loads at Gotland Ferry Service
september 14, 2018/av johan_kanData i sig saknar intelligens – Men att använda data är smart
augusti 30, 2018/av johan_kanInsurtech blir det nya fintech
juli 30, 2018/av johan_kanWannacry = Pojken & Vargen
juni 30, 2018/av johan_kanIngår innovation i vardagen i ert arbetssätt 2018?
maj 30, 2018/av johan_kanSex insikter om säkerhet 2017
april 30, 2018/av johan_kanTech Meetup – Se filmerna
april 30, 2018/av johan_kanAWS, AZURE & GOOGLE – EN JÄMFÖRELSE
april 30, 2018/av johan_kanToppresultat i outsourcing-undersökning
april 10, 2018/av johan_kanIn, ut eller kvar på ledningsgruppens agenda 2017
mars 30, 2018/av johan_kanSäkerhetsteam utan säkerhetsexperter
mars 30, 2018/av johan_kanMultisourcingstrategi
februari 20, 2018/av johan_kanFramtidens digitala hot
februari 10, 2018/av johan_kanWilly Domaas om informationssäkerhet
februari 10, 2018/av johan_kanStefan om IT-innovation
februari 10, 2018/av johan_kanStar Wars – de goda mot de onda
januari 30, 2018/av johan_kanVäxer hotet om DDoS-attacker?
januari 10, 2018/av johan_kanHur hög är din innovationstakt?
oktober 30, 2017/av johan_kanPer om IT-affärer
oktober 30, 2016/av johan_kan
Scroll to top