German
  • The Secret to Effective Remote Access VPN Management

    more
    Cybersecurity Strategy · Data Security · Endpoint Management

    Apple macOS Catalina: Plenty of new features and a spotlight on security

    The current major release of macOS, Catalina was announced recently. As ever with Apple, the list of changes is very long and ranges from using an iPad as a second screen (SideKick) to the...

    Data Security · Encryption · Internet of Things

    Building Trust to Create Smart Cities

    The Internet of Things (IoT) is having a growing impact on helping to make the lives of citizens easier and more efficient. Smart devices have become increasingly common in the average home, from...

    Data Security · Endpoint Management · Internet of Things

    Industrial control systems still at risk

    While security incidents involving ransomware and  data breaches  have have received much media attention, incidents in the industrial control sector rarely make the headlines. We hear so little, you...

    Cybersecurity Strategy · Data Security · Encryption

    Anonymous Database Data is Nothing without Encryption

    In recent years, the world has witnessed a major change in the way personal data is managed and protected. EU General Data Protection Regulation (GDPR) and other regulatory initiatives have granted...

    Cloud · Cybersecurity Strategy · Data Security · Internet of Things

    IIoT Fog Computing Must Not Cloud the Need for Cybersecurity

    Cloud computing and the Industrial Internet of Things (IIoT) are opening up all kinds of new horizons for manufacturing and industry. From connected cars and smart cities to real-time analytics and 5G...

    Cybersecurity Strategy · Endpoint Management

    Cyber Security Month – Reason to celebrate?

    This October is time again for the European Cyber Security Month (ECSM), an initiative which is managed by the European Union. During the campaign which lasts throughout the month, the EU aims to...

    Cybercrime · Cybersecurity Strategy · Data Security · Internet of Things

    Cybercriminals Migrate to Mobile Banking

    We live in a connected world. Life without our mobile devices providing us with constant, easy access to a wealth of apps and services is scarcely imaginable. For all this convenience, however, there...

    Petty cash won't cover the cost of a data breach

    Disclosing data unlawfully or becoming embroiled in a security incident has always been inconvenient and generally costly for business. Business critical information might fall into the wrong hands or...

    Blog · Cybersecurity Strategy · Data Security · Internet of Things

    Senate Moves to Set a Price on Data Privacy

    A new bill that could fundamentally change the relationship between major tech companies and their customers is being debated in the U.S. Senate. The move is the first attempt to assign a dollar...

    Data Security · Encryption · Internet of Things

    Encryption Holds Clue to Solving AI-driven Police Surveillance Fears

    Police use of Artificial Intelligence (AI) for law enforcement is coming under intense scrutiny as fears grow over its potential for misuse. Surveillance technologies with embedded AI like biometrics...

    This website uses cookies

    We use cookies to personalize content and analyze access to our website. You can find further information in our data protection policy.

    OK