This website uses cookies

We use cookies to personalize content and analyze access to our website. You can find further information in our data protection policy.

OK

Posts tagged with threats

Data protection
Cybercrime · Data Security · VPN

The ten most serious cyber crimes and data breaches to date

People are often quick to adapt – now we don’t seem to blink an eyelid when we read news about another hacked server and the loss of a few million records of personal data. Only the most spectacular...

Online Data Security Concept
Data Security · Encryption · SSL

SSL: Still Secure When Configured Correctly

The Secure Socket Layer (SSL ) protocol is under attack: in recent months, a succession of vulnerabilities and successful breaches have raised questions about the effectiveness of this ubiquitous...

Padlock Icon Computer Key Showing Safety Security And Protected
Cybersecurity Strategy · Data Security

Is Industry 4.0 Ready for the Ransomware Threat?

Ransomware is the latest trend in criminal malware. It infects computers, encrypts data and demands a ransom payment in the form of bitcoins. The encryption is so strong that it has not yet been...

Hands Around Table
VPN

How Far Does Your Cybersecurity Umbrella Extend?

Network administrators: No matter how impenetrable you think your network defenses are, there are always going to be remote access vulnerabilities that threaten the integrity of your walls. Often,...

cell_phone_security_qi2tz
Mobile · SSL · Windows 7

SSL Myths and Mobile Devices

Since posting our series on SSL myths, some people have asked how these SSL vulnerabilities apply to mobile phones. While mobile phones and other handheld devices are mistakenly considered relatively...

Rethink Remote Access · SSL

FDE and VPN: Don't Throw out the Security Baby with the Legacy Bathwater, Part 1

By Cameron Laird

Rethink Remote Access · SSL

FDE and VPN: Don't Throw out the Security Baby with the Legacy Bathwater, Part 1

By Cameron Laird

Endpoint Management · Rethink Remote Access

How to Keep Businesses Safe from Security Breaches

By Sylvia Rosen

BlackHat_2011
Expert Q&A · Industry Commentary · Shows

“Taking Precautions at Black Hat is Always Good”

Black Hat 2011 has kicked off in steamy Las Vegas (highs over 100 this week!). But Black Hat isn’t about the weather, it’s about the hacking. And there will be hacking. ZDNet has already rounded up...

remote-work
Industry Commentary · IT policy · Rethink Remote Access

What Annoys You about Remote Access? Part 1

The world of remote access is, no doubt, a complicated one. On one hand, we can’t imagine life without it – and on another – it sometimes feels like the bane of every IT administrator’s existence. So,...