This website uses cookies

We use cookies to personalize content and analyze access to our website. You can find further information in our data protection policy.

OK

Posts tagged with IT security

Cybersecurity Strategy · IT policy

Realizing the potential of exploit toolkits

Anti-virus companies have identified a new trend: Criminals are increasingly using open source software instead of developing or purchasing their own malware. Kaspersky Lab recently revealed several...

safe-913452_1920
Cybersecurity Strategy · Encryption · Endpoint Management · Internet of Things

Internet of Things raises fresh security challenges for industry

For many years industries like oil and gas, electricity, agriculture and utilities have relied on operational communications infrastructure outside the main corporate network to collect data and...

Padlock Icon Computer Key Showing Safety Security And Protected
Cybersecurity Strategy · Data Security

Is Industry 4.0 Ready for the Ransomware Threat?

Ransomware is the latest trend in criminal malware. It infects computers, encrypts data and demands a ransom payment in the form of bitcoins. The encryption is so strong that it has not yet been...

Business infographic icons set. Illustration eps10
Cybersecurity Strategy · IT policy

Big Data and IT Security – SIEM as an Analysis Tool

Over the last few years, gleaning useful information from massive amounts of data has also become more difficult for IT security and approaches to Big Data and information analysis are a critical...

cog
IT policy

Plan, Install and Operate VPN Gateways in Accordance with the BSI’s Basic IT Security Manual

While the core focus of IT administrators may not be security, they are often tasked with looking after network security, leading them to sometimes feel overwhelmed. They might ask themselves: “How do...

Hands Around Table
VPN

How Far Does Your Cybersecurity Umbrella Extend?

Network administrators: No matter how impenetrable you think your network defenses are, there are always going to be remote access vulnerabilities that threaten the integrity of your walls. Often,...

Freelance Desk
VPN · Windows 10

Open Haus: Updated VPN Clients and Server

Of all the factors that would prevent an organization from launching a comprehensive remote access security strategy – limited budget, unfamiliarity with emerging threat vectors, lack of employee...

7 Security Threats Your May Have Overlooked
Endpoint Management · Industry Commentary

7 Security Threats You May Have Overlooked

If there's been a silver lining to the string of devastating cyberattacks against some of the biggest organizations in the world over the last year, it's that the list of "what not to do" has...

Shellshock Leaves Deep Impact on Network Security
Industry Commentary · IPsec · IT policy · VPN

Shellshock Leaves Deep Impact on Network Security

For the last 30 years, a common line of code found in a piece of software has quietly been a dormant security vulnerability – but now, news of the exploit has gone public, sending the network security...

Industry Commentary · IT policy · Mobile · SSL · virtualization · VPN

VPNs Enable Desktop Virtualization

By Bernd Reder