This website uses cookies

We use cookies to personalize content and analyze access to our website. You can find further information in our data protection policy.

OK
German
  • The Secret to Effective Remote Access VPN Management

    more
    Internet-of-Things
    Data Security · Internet of Things

    With sensors everywhere, how can we keep data secure?

    The idea behind the Internet of Things (IoT) is that everyday objects can connect to each other and exchange data via the Internet. Even the smallest components, such as sensors for measuring...

    shield
    Data Security · Encryption · Endpoint Management · VPN

    VPNs can ease privacy concerns

    High profile data breaches at companies like Mossack Fonseca, Target, Home Depot and Wendy’s along with Government controversies like Edward Snowden and the FBI’s legal suit against Apple after the...

    76df8aa2-2f17-4a2a-80c1-c1e450256ba4
    Cloud · Data Security

    Control over our data

    Anybody who uses the Internet uses, creates and leaves data behind. While in the past site visits were recorded in the depths of server log files rarely to surface again, these and related data are...

    smart building photo
    Cybersecurity Strategy · Data Security · Encryption · Internet of Things · Smart Buildings · Smart City

    Smart buildings merit smarter security

    Architects and city planners first began promoting the concept of Smart Buildings, or Building Automation Systems (BAS), around ten years ago. Smart buildings were meant to deliver untold benefits...

    blue arrow and white target
    Cybersecurity Strategy · Internet of Things

    Relevant security standards for Internet of Things

    Virtually every study exploring the benefits of Internet of Things includes some reservations on IT security. According to an analysis by Deutsche Telekom 90% of managers are concerned about security...

    times-square-401652_1280
    Digital Signage · Encryption · Internet of Things · VPN

    Securing digital signage systems

    The average company network has many more devices connecting to it than even just a few years ago. In addition to traditional workstations there are now smartphones and tablets alongside a wide...

    Data Security · VPN

    More anonymity with Tor and VPN?

    Tor (The Onion Router) is one of the most important tools for anonymity on the Internet. The Tor network, protocol and client, make it extremely complicated to trace user activity. However, Tor users...

    Connected Cars-pexels-photo-60803
    Connected Cars · Encryption · Endpoint Management · Internet of Things

    Connected cars: fresh safety hazards on the road ahead

    Advances in connected car technology are set to radically alter the future of driving for everyone. Among the promised benefits is the ability for cars to ‘learn’ from each other, provide early...

    Cybersecurity Strategy · IT policy

    Realizing the potential of exploit toolkits

    Anti-virus companies have identified a new trend: Criminals are increasingly using open source software instead of developing or purchasing their own malware. Kaspersky Lab recently revealed several...

    Internet-of-Things
    Cybersecurity Strategy · IT policy

    Vulnerability scan for Industry 4.0 with LARS

    Not a day goes by without Industry 4.0 being touted as the future of the manufacturing industry. And it's true, the digitization of production environments is already gaining traction, in some sectors...