This website uses cookies

We use cookies to personalize content and analyze access to our website. You can find further information in our data protection policy.

OK

Post of category Data Security

Cybersecurity Strategy · Data Security · Digital Signage · Endpoint Management · Internet of Things

Protecting Industrial Intelligence Against Attacks

In recent years, many of the world’s isolated industrial control systems (ICS) in manufacturing and critical infrastructure have been joined with information technology (IT) networks. There are clear...

Data Security

Another day, another GDPR mail

The world didn’t stop turning on May 25 when the EU General Data Protection Regulation (GDPR) came into force, despite the mass panic among many companies, as if they had just seen an intercity...

Cybersecurity Strategy · Data Security · Encryption · Endpoint Management

Business travelers should fly under the radar

Thanks to the constant availability of today’s mobile network coverage and public Wi-Fi hotspots, we tend to take connectivity for granted. Our smartphones and mobile devices are with us wherever we...

Data Security · Encryption

Can Governments be trusted to keep our data private?

Governments and state agencies everywhere would like us to believe that our personal data is safe in their hands. They say this information is vital. Without it, they claim, it would be impossible to...

2 Factor Authentication · Cybersecurity Strategy · Data Security

WebAuthn – The next nail in the coffin for usernames and passwords

It's a lingering death, but at some point the last username/password combination will be entered. This is a good thing, because one data breach after another shows that neither the private sector nor...

Connected Cars · Data Security · Digital Signage · Internet of Things

Smart cities – Big data meets Big Brother

Smart Cities are evolving at a phenomenal pace. Not so long ago, smart city initiatives were little more than a series of discrete pilot projects. Now, public officials worldwide have latched on to...

Data Security

Forces push data privacy to the forefront

Until very recently, data privacy has never ranked very high in the public consciousness. In opinion polls last year, people were nearly split evenly when asked about the need for stricter regulations...

Cybersecurity Strategy · Data Security

Addressing Cryptocurrency Trading Security Issues

Cryptocurrency trading has been gathering pace over the past few years and has been compared to the American Wild West. Early adventurers have faced tremendous risks in terms of extreme market...

Cybercrime · Data Security

Easy money: Cryptocurrency mining trojans are trending

It’s hard to miss the irony of the British government’s Information Comissioner’s Office (ICO) being targeted by an illegal cryptocurrency mining campaign. After indications that attackers had...

Blog · Data Security · Encryption · Endpoint Management · Internet of Things

What does built-in IIoT security look like?

What Does Built-in IIoT Security Look Like? Companies are racing to take advantage of new revenue opportunities, operational efficiencies and cost savings offered by the multitude of IP-connected...