• The Secret to Effective Remote Access VPN Management

    Data protection
    2 Factor Authentication · Cybersecurity Strategy · Data Security

    The national economic protection strategy in Germany and real life

    When it comes to security, public authorities in any country also want to represent their interests, some more intensively than others. Germany is not lacking in initiatives and organizations that...

    Cybersecurity Strategy · Encryption · Endpoint Management · Internet of Things

    Internet of Things raises fresh security challenges for industry

    For many years industries like oil and gas, electricity, agriculture and utilities have relied on operational communications infrastructure outside the main corporate network to collect data and...

    Online Data Security Concept
    Data Security · Encryption · SSL

    SSL: Still Secure When Configured Correctly

    The Secure Socket Layer (SSL ) protocol is under attack: in recent months, a succession of vulnerabilities and successful breaches have raised questions about the effectiveness of this ubiquitous...

    Cybersecurity Strategy · Data Security · Encryption · Endpoint Management · VPN

    Web of Spies

    Ever since Edward Snowden revealed the extent of state-sponsored espionage over the Internet in 2013 businesses have been acutely aware of just how vulnerable data communications are to being...

    Cloud · Cybersecurity Strategy · Data Security · Encryption · VPN

    Cloud Security Pitfalls to Avoid

    Cloud computing technology is fast becoming an attractive alternative to maintaining IT systems and applications on premise. In-house management and maintenance of IT is costly and resource-hungry....

    Data Security · Endpoint Management · Wi-Fi

    Staying Safe at Wi-Fi Hotspots

    Wi-Fi hotspots in coffee shops, hotels, railway stations and airports have become a welcome resource for any business traveler, providing them with a convenient means to carry on working while on the...

    Padlock Icon Computer Key Showing Safety Security And Protected
    Cybersecurity Strategy · Data Security

    Is Industry 4.0 Ready for the Ransomware Threat?

    Ransomware is the latest trend in criminal malware. It infects computers, encrypts data and demands a ransom payment in the form of bitcoins. The encryption is so strong that it has not yet been...

    Cybersecurity Strategy · Internet of Things · VPN

    Flaws in Industrial IoT Underline Importance of Secure Connectivity

    According to the leading analyst firm Gartner Group over 50% of major new business processes and systems will incorporate some element of the Internet of Things (IoT) by the year 2020. The potential...

    Cybersecurity Strategy · VPN

    Threat Intelligence-as-a-Service brings SIEM Within Reach of SMEs

    Organizations are being targeted by cybercriminals more than ever. According to the latest statistics from Symantec, 52.4% of phishing attacks in December 2015 were against small and medium-sized...

    globe data lock
    Data Security

    The World after Safe Harbor

    In October 2015, the European Court of Justice (ECJ) declared the Safe Harbor Agreement for transferring data to the USA invalid. The decision was based on a lawsuit filed by the Austrian, Maximilian...