All 181 /Azure 0 /Big data blog 18 /Big data customer case 0 /Blog 0 /Blog 0 /Cloud blog 42 /Cloud customer case 0 /DevOps 0 /DevOps blog 14 /Event 0 /Guide 0 /Industries 0 /IT security 0 /Managed Services customer case 0 /Managed Services kundcase 0 /Old events 0 /Press release 0 /Security blog 123 /Security customer case 0 /Uncategorized 0 /Webinar 0
Basefarm once again marks itself as a leading Nordic sourcing supplier
May 3, 2022/by johan_kanHow to optimize the cloud with WAF
March 8, 2022/by johan_kanCloud can help relieve the digital pressure on CIOs
February 15, 2022/by johan_kanCloud becomes essential to accelerate digital business initiatives
February 15, 2022/by johan_kanCloud: helping COOs deal with an unprecedented level of change
February 15, 2022/by johan_kanCOST CONTROL IN A TIME OF MULTICLOUD AND “CLOUD NATIVE”
December 3, 2021/by johan_kanIt’s a journey – not a destination
December 2, 2021/by johan_kanISG Positions Basefarm as leader in next generation private and hybrid cloud solutions
September 14, 2021/by johan_kanWhy is running a Kubernetes employee challenge a good idea?
August 30, 2021/by johan_kanProtect your organization from ransomware
July 8, 2021/by johan_kanSchrems II implications
June 30, 2021/by johan_kanWhitelane Research & PA Consulting – Basefarm customers are highly satisfied
April 21, 2021/by johan_kanOPENING UP THE CLOUD‑NATIVE WORLD
February 5, 2021/by johan_kanManaging multi-cloud infrastructure is key to reducing time to market
February 4, 2021/by johan_kanHow to achieve flexible IT provision – four tips
February 3, 2021/by johan_kanWe are in the middle of a digital revolution!
September 30, 2020/by johan_kanWhat is Microsoft Azure?
September 28, 2020/by johan_kanThe world’s biggest Work-From-Home Experiment
March 30, 2020/by pclarkeSecurity Software & Tools Tips – November 2019
March 9, 2020/by johan_kanHappy Birthday, CVE!
March 9, 2020/by johan_kanInsider threats
March 9, 2020/by johan_kanVisa Warns of New JavaScript Skimmer ‘Pipka’
March 9, 2020/by johan_kanData leaks and breaches
March 9, 2020/by johan_kanThreat Hunting or Efficiency: Pick Your EDR Path?
March 9, 2020/by johan_kanSecurity Software & Tools Tips – December 2019
March 9, 2020/by johan_kanBasefarm security news
March 9, 2020/by johan_kanNew year, new vulnerabilities
March 9, 2020/by johan_kanThe State of Breach Protection 2020
March 9, 2020/by johan_kanVulnerable Citrix Appliances
March 9, 2020/by johan_kanCloud security is voodoo?
March 9, 2020/by johan_kanCVE-2020-0618 | Microsoft SQL Server Reporting Services Remote Code Execution Vulnerability
March 9, 2020/by johan_kanThemeREX Addons – Remote Code Execution (0day, Being Exploited)
March 9, 2020/by johan_kanVMSA-2020-0003 vRealize Operations for Horizon Adapter updates address multiple security vulnerabilities (CVE-2020-3943, CVE-2020-3944, CVE-2020-3945)
March 9, 2020/by johan_kanCVE-2020-3158 – Cisco Smart Software Manager On-Prem Static Default Credential Vulnerability
March 9, 2020/by johan_kanBasefarm security news
March 9, 2020/by johan_kanCVE-2020-1938 – Apache Tomcat AJP Request Injection and potential Remote Code Execution
March 9, 2020/by johan_kanCVE-2020-0688 | Microsoft Exchange Validation Key Remote Code Execution Vulnerability
March 9, 2020/by johan_kanReality Check: The Story of Cybersecurity
March 9, 2020/by johan_kanNation state actors plays the long game
March 9, 2020/by johan_kanHappy Birthday, CVE!
March 9, 2020/by johan_kanInsider threats
March 9, 2020/by johan_kanVisa Warns of New JavaScript Skimmer ‘Pipka’
March 9, 2020/by johan_kanData leaks and breaches
March 9, 2020/by johan_kanThreat Hunting or Efficiency: Pick Your EDR Path?
March 9, 2020/by johan_kanSecurity Software & Tools Tips – December 2019
March 9, 2020/by johan_kanBasefarm security news
March 9, 2020/by johan_kanNew year, new vulnerabilities
March 9, 2020/by johan_kanThe State of Breach Protection 2020
March 9, 2020/by johan_kanSecurity Software & Tools Tips – November 2019
March 9, 2020/by johan_kanHistoric data is an insufficient basis for making good decisions
September 13, 2019/by johan_kanContinuous development using containers
August 22, 2019/by johan_kanHundreds of Vulnerable Docker Hosts Exploited by Cryptocurrency Miners
August 22, 2019/by johan_kanWomen In Tech 2019
August 22, 2019/by johan_kanChange your Facebook password now!
August 22, 2019/by johan_kanNorsk Hydro lose more than NOK 300-350 millions in a week after attack
August 22, 2019/by johan_kanSecurity Software & Tools Tips – March 2019
August 22, 2019/by johan_kan540 Million Facebook User Records Found On Unprotected Amazon Servers
August 22, 2019/by johan_kanBug-hunters punch huge holes in WPA3 standard for Wi-Fi security
August 22, 2019/by johan_kanSecurity Software & Tools Tips – April 2019
August 22, 2019/by johan_kanMicrosoft confirms Outlook.com and Hotmail accounts were breached
August 22, 2019/by johan_kanThe strengths and weaknesses of different VPN protocols
August 22, 2019/by johan_kanWindows Zero-Day Emerges in Active Exploits
August 22, 2019/by johan_kanSecurity Software & Tools Tips – May 2019
August 22, 2019/by johan_kanNew Initiative Aims to Fast-Track Women into Cybersecurity Careers
August 22, 2019/by johan_kanTHE BANK THAT CAN SLEEP WELL AT NIGHT
August 22, 2019/by johan_kanWHEN BUSINESS CONTINUITY IS KEY
August 22, 2019/by johan_kanHYBRID CLOUD FOR PEAK LOADS AT DESTINATION GOTLAND
August 22, 2019/by johan_kanNew Class of CPU Flaws Affect Almost Every Intel Processor Since 2011
August 22, 2019/by johan_kanSingle point of Truth for Germany’s train travelers
August 22, 2019/by johan_kanSecretary General gives keynote speech on NATO’s adaption to cyber threats
August 22, 2019/by johan_kan2.3B Files Exposed in a Year: A New Record for Misconfigs
August 22, 2019/by johan_kanRAMBleed, a new side-channel attack enables attackers to read memory not belonging to them
August 22, 2019/by johan_kanSecurity Software & Tools Tips – June 2019
August 22, 2019/by johan_kanSACK Panic kernel bug discovered by Netflix
August 22, 2019/by johan_kanOpenSSH Now Encrypts Secret Keys in Memory Against Side-Channel Attacks
August 22, 2019/by johan_kanSecurity Software & Tools Tips – July 2019
August 22, 2019/by johan_kanDon’t let encrypted messaging become a hollow promise
August 22, 2019/by johan_kanSecurity Software & Tools Tips – August 2019
August 22, 2019/by johan_kanIOT specialist IIOX adopts Flexible Engine for business agility in the cloud
August 22, 2019/by johan_kanSecurity Software & Tools Tips – August 2019
August 18, 2019/by johan_kanIOT specialist IIOX adopts Flexible Engine for business agility in the cloud
July 30, 2019/by johan_kanDon’t let encrypted messaging become a hollow promise
July 26, 2019/by johan_kanSecurity Software & Tools Tips – July 2019
July 21, 2019/by johan_kanOpenSSH Now Encrypts Secret Keys in Memory Against Side-Channel Attacks
June 28, 2019/by johan_kanSecurity Software & Tools Tips – June 2019
June 23, 2019/by johan_kanSACK Panic kernel bug discovered by Netflix
June 21, 2019/by johan_kanRAMBleed, a new side-channel attack enables attackers to read memory not belonging to them
June 14, 2019/by johan_kanDownload How you move to AWS guide
June 5, 2019/by johan_kanAWS migration guide
June 5, 2019/by johan_kan2.3B Files Exposed in a Year: A New Record for Misconfigs
May 31, 2019/by johan_kanSecretary General gives keynote speech on NATO’s adaption to cyber threats
May 24, 2019/by johan_kanSingle point of Truth for Germany’s train passengers
May 20, 2019/by johan_kanSecurity Software & Tools Tips – May 2019
May 19, 2019/by johan_kanNew Class of CPU Flaws Affect Almost Every Intel Processor Since 2011
May 17, 2019/by johan_kanNew Initiative Aims to Fast-Track Women into Cybersecurity Careers
May 10, 2019/by johan_kanWindows Zero-Day Emerges in Active Exploits
May 3, 2019/by johan_kanBasefarm tops prestigious client satisfaction survey
April 29, 2019/by johan_kanThe strengths and weaknesses of different VPN protocols
April 26, 2019/by johan_kanSecurity Software & Tools Tips – April 2019
April 21, 2019/by johan_kanMicrosoft confirms Outlook.com and Hotmail accounts were breached
April 19, 2019/by johan_kanWHEN BUSINESS CONTINUITY IS KEY
April 15, 2019/by basefarmHYBRID CLOUD FOR PEAK LOADS AT DESTINATION GOTLAND
April 15, 2019/by basefarmBug-hunters punch huge holes in WPA3 standard for Wi-Fi security
April 12, 2019/by johan_kan540 Million Facebook User Records Found On Unprotected Amazon Servers
April 5, 2019/by johan_kanSecurity Software & Tools Tips – March 2019
March 31, 2019/by johan_kanNorsk Hydro lose more than NOK 300-350 millions in a week after attack
March 29, 2019/by johan_kanChange your Facebook password now!
March 22, 2019/by johan_kanWomen In Tech 2019
March 14, 2019/by johan_kanHundreds of Vulnerable Docker Hosts Exploited by Cryptocurrency Miners
March 8, 2019/by johan_kanContinuous development using containers
March 5, 2019/by basefarmSecurity Software & Tools Tips – October 2018
October 1, 2018/by stefan mansbyWhy use a Managed Service Provider for Amazon Web Services
October 1, 2018/by basefarmHow a Web Application Firewall can protect against bad coding
September 28, 2018/by basefarmHackers Turn to Python as Attack Coding Language of Choice
September 28, 2018/by stefan mansbyCIOs don’t know what DevOps is
September 24, 2018/by jan aril sigvartsenThousands of breached websites turn up on MagBo Black market
September 21, 2018/by abel de kat angelino5 tips for better cloud security
September 14, 2018/by trond hagenBF-SIRT Newsletter 2018-02
September 14, 2018/by johan_kan3 takeaways from SQLSaturday in Oslo
September 7, 2018/by basefarmBlocking cyber attacks; Why you should understand adversary playbooks
September 7, 2018/by hans-petter fjeldCheck for the Security-First Mindset Across All Teams
August 31, 2018/by stefan mansbyHow to move mountains – our road to continuous delivery
August 28, 2018/by basefarmAn app in a day
August 27, 2018/by basefarmWhat we learned from DEF CON 26
August 27, 2018/by hans-petter fjeldSecurity is Not a One-Person Job
August 24, 2018/by stefan mansbyTLS 1.3 – Internet Security Gets a Boost
August 17, 2018/by trond hagenBF-SIRT Newsletter 2018-32
August 10, 2018/by raymond aarsethWebinar – Ready to deep dive into the data lake?
August 9, 2018/by johan_kanFaster time to market with automated workflow
August 8, 2018/by basefarmFive security trends to watch out for
August 8, 2018/by basefarmHybrid cloud for peak loads at Gotland Ferry Service
August 7, 2018/by basefarmHow does digital transformation actually work?
August 7, 2018/by basefarmIBM PowerAI
August 6, 2018/by basefarmBF-SIRT Newsletter 2018-31
August 3, 2018/by abel de kat angelinoAre you prepared for DDoS attacks?
August 2, 2018/by basefarmIntroducing Nordkap – a Swedish success story
August 2, 2018/by basefarmSuccessful IT Partnerships
July 31, 2018/by basefarmMicrosoft Azure Platform
July 30, 2018/by basefarm5 IT Trends that will shape the next 5 years (Part 4): Cloud Security
July 25, 2018/by basefarm5 IT Trends that will shape the next 5 years (Part 3): Multi Cloud & Hybrid Cloud
July 25, 2018/by basefarmCloud services or managed services: What’s the difference?
July 25, 2018/by basefarm5 R’s for Cloud Migration
July 24, 2018/by basefarmUnikernel technology versus Containerization
June 19, 2018/by basefarmHow cloud Act influence European business
June 19, 2018/by fredrik svantes8 benefits of using Microsoft CSP for your Azure consumption
June 18, 2018/by geir morten allumBalancing security in hybrid cloud environment
May 21, 2018/by basefarmCritical IT services need dedicated SOC for GDPR compliance
May 11, 2018/by basefarmWhat AI and machine learning are and how they relate to IoT
April 23, 2018/by basefarmAre you prepared for social engineering and the Next Corporate hack?
April 23, 2018/by basefarmBF-SIRT Newsletter 2018-16
April 20, 2018/by hans-petter fjeldReady to speed up your development?
April 19, 2018/by basefarmRussian State-Sponsored Cyber Actors Targeting Network Infrastructure
April 17, 2018/by fredrik svantesBF-SIRT Newsletter 2018-15
April 13, 2018/by fredrik svantesWhat is DevOps? – A definition
April 10, 2018/by ronald tensenBF-SIRT Newsletter 2018-14
April 6, 2018/by abel de kat angelinoBF-SIRT Newsletter 2018-12
March 23, 2018/by hans-petter fjeldMalware is so 2017: five new security trends to watch out for
March 23, 2018/by basefarmBF-SIRT Newsletter 2018-11
March 16, 2018/by fredrik svantesWhat is Big Data? – A definition with five Vs
March 13, 2018/by stefan mansbyBF-SIRT Newsletter 2018-10
March 9, 2018/by abel de kat angelinoA comparison of public cloud providers: AWS, Azure, and Google. Part 2
March 8, 2018/by jan aril sigvartsenA comparison of public cloud providers: AWS, Azure, and Google. Part 1
March 5, 2018/by jan aril sigvartsenBF-SIRT Newsletter 2018-09
March 2, 2018/by abel de kat angelinoDon’t let big data turn us into Big Brothers
February 28, 2018/by stefan mansbyData is stupid; using it is clever
February 25, 2018/by stefan mansbyBF-SIRT Newsletter 2018-08
February 23, 2018/by abel de kat angelinoData thinking is the holy grail of organic growth
February 20, 2018/by stefan mansbyReady to deep dive into the data lake?
February 17, 2018/by ingo steinsBF-SIRT Newsletter 2018-07
February 16, 2018/by fredrik svantesBF-SIRT Newsletter 2018-06
February 9, 2018/by abel de kat angelinoBF-SIRT Newsletter 2018-05
February 2, 2018/by trond hagenBF-SIRT Newsletter 2018-04
January 26, 2018/by hans-petter fjeldBF-SIRT Newsletter 2018-03
January 19, 2018/by fredrik svantesWhere does Big Data begin? – Many perspectives, one classification
January 16, 2018/by stefan mansbyBF-SIRT Newsletter 2018-02
January 12, 2018/by fredrik svantesBig Data Intro-Webinar!
January 10, 2018/by stefan mansbyBig data Olympics
January 8, 2018/by ronald tensenBF-SIRT Newsletter 2018-01
January 5, 2018/by hans-petter fjeldIS THE FINANCE INDUSTRY AFRAID OF THE CLOUD?
October 6, 2017/by basefarmSeven ways to survive the cloud
October 2, 2017/by jan aril sigvartsenCloud strategy
September 11, 2017/by jan aril sigvartsenBusiness inquiries
Press
Sara Murby Forste
Country Manager / VD
Service Desk 24/7/365
We are here for you :
Career
Are you our new expert?
Contact
Nathalie Rodriguez Snell
nathalie.rodriguez@basefarm.com
+46 735260078
Social
Contact the office
Adress: Gårdsvägen 6, 169 70 Solna
E-post: contact@basefarm.com
Telefon:+46 850 11 26 00