An honest view on buying and owning a Tesla

An honest view on buying and owning a Tesla

In recent years, Tesla has become a major player in the automotive industry, thanks to its electric vehicles which are known for their innovative features and cutting-edge technology. One of the latest additions to the Tesla family is the Model Y, an all-electric compact SUV that has quickly gained a reputation for being one of…

Four types of organizations…

Four types of organizations…

… when it comes to their IT security behavior. This famous quote from John Chambers is very well known and probably in everyone’s mind: There are only two types of organizations: Those that have been hacked and those that don’t know it yet! John Chambers It already describes the situation in the market very well.…

LASTPASS MASTERY MOMENTS: The new UAC

LASTPASS MASTERY MOMENTS: The new UAC

LastPass has taken significant strides with the new UAC (Unified Admin Console), moving towards a modern, unified administrative interface. This console consolidates the previously scattered and extensive administrative capabilities of LastPass into a single, easy-to-use platform. The new UAC not only introduces numerous new features but also simplifies administrative processes, providing companies with an opportunity…

Escape the Cyber Threat Bermuda Triangle

Escape the Cyber Threat Bermuda Triangle

In the Computerwoche webcast, I join experts to discuss the threats companies face regarding access credentials — and why enterprise password management is the solution. This webinar is one of the best, most exciting, and most informative sessions I’ve had the privilege to participate in. From a live demonstration showing how easy it is to…

Digital Bash Cyber Security

Digital Bash Cyber Security

I had the pleasure speaking at the Digital Bash webinar series – the self proclaimed “largest web conference in the digital industry”. I, of course, had the chance speaking about the importance of password security in companies. This time though I tried having a little more focus on what secure passwords actually are – how…

Close