• The Secret to Effective Remote Access VPN Management

    Cybersecurity Strategy · Encryption · VPN

    VPN and Bitcoin: A Cloak of Invisibility for Shoppers of Digital Goods

    Bitcoin, the digital currency underpinned by block chain technology, first entered circulation in 2009. Though users are only just beginning to scratch the surface of its full potential, Bitcoin is...

    Cybersecurity Strategy · Internet of Things · VPN

    Making IIoT Security More Robust

    The Christmas season is upon us and retailers are excitedly stocking their shelves.  Once again, Internet-connected consumer gadgets, or Internet of Things (IoT) devices, are expected to be among...

    Data Security

    IT security in the health sector

    More and more devices in doctor’s offices and hospitals are connected to networks. Diagnoses and therapies are now stored digitally at hospitals, laboratory reports are transmitted over the internet...

    Mobile · VPN

    Internet Security Programs for Students

    Guest blog post from Daniel Waterman

    Data Security · Mobile

    Is Mobile Security Broken?

    The way we work has changed. No longer tied to our desks, our laptops, tablets and smartphones let us do our job from wherever we want – at the office, at home or even while on-the-move. We can also...

    Cybersecurity Strategy · VPN

    Vote of confidence for IT security made in Germany

    Where is your IT manufacturer based? What used to be a trivial matter of image has now become a security issue. Three years after Edward Snowden's revelations, CEOs understandably feel uncomfortable...

    Data Security · VPN

    Banking on VPNs

    Almost everyone in business has reason to be grateful for the existence of SWIFT. SWIFT (the Society for Worldwide Interbank Financial Telecommunications system) is the international banking and funds...

    Cybersecurity Strategy

    European Cyber Security Month - A month dedicated to cyber security

    Most people claim to know how important IT security is. The reality is somewhat different. Demands on employees time are high, there are millions of distractions and somehow the backup at the end of...

    Encryption · Privacy

    Naked Privacy: the Legacy of Snowden

    “We the public are at one of the last points that we will have to make a difference in how normalised the culture of mass surveillance becomes.”

    Internet of Things

    IT security for Industrial Internet of Things

    Vulnerabilities in the vision of industrial digitalization and networking

    This website uses cookies

    We use cookies to personalize content and analyze access to our website. You can find further information in our data protection policy.