German
  • The Secret to Effective Remote Access VPN Management

    more
    Data Security

    Extended Mass Surveillance Increases Pressure to Keep Data Comms Private

    Congress has approved a six-year extension of Section 702 of the U.S. surveillance law. This means the continuation of PRISM, the controversial mass surveillance program first exposed by Edward...

    Cloud · Data Security

    Security in the cloud

    There are many studies on IT security and depending on the companies behind them and their purpose, the results are always to be treated with caution. But even if the absolute figures leave room for...

    Cybersecurity Strategy · Data Security · Internet of Things · IT policy · VPN

    Protecting Mobile Data Privacy in the Enterprise

    The workplace today is dominated by mobile devices. Employee interaction via smartphone or tablet has become second nature.  They will very likely use them to check work emails, download files...

    Cybercrime · Data Security

    Meltdown and Spectre – play down or panic?

    Users have long since accepted that software errors can be exploited for digital attacks. In fact, these have become so frequent that only highly critical incidents make the news. Hardware is mostly a...

    Cloud · Connected Cars · Digital Signage · Internet of Things · Smart Buildings · VPN

    Keeping Industrial Revolution 4.0’s Treasures Hidden

    The growing use of Industrial Internet of Things (IIoT) worldwide is in the process of turning the concept of smart factories into reality. The phenomenon has been described by observers as the fourth...

    Cybersecurity Strategy · Data Security · Internet of Things · Privacy

    Looking into the crystal ball

    In 2017, some of the worst data incidents of recent years have occurred. Whether Equifax, Uber  or Maersk, organizations have had to admit, sometimes too late, that their customers’ personal data have...

    Connected Cars · Internet of Things · Privacy · VPN

    Could Net Neutrality reversal spell open season for connected car data?

    The U.S. Federal Communications Commission (FCC) has voted to overturn Net Neutrality. The decision gives internet service providers (ISPs) and telecom companies the right to prioritize services...

    Data Security · Internet of Things · Privacy · Wi-Fi

    Christmas is coming – but turn off the Wi-Fi

    Every year, as Christmas draws nearer, many can be heard questioning the sanity of annual gifting madness. In the past, everything was better when the parents themselves were children and most were...

    vpn
    Cybersecurity Strategy · Encryption · Endpoint Management · IT policy · VPN

    Four Common Myths about VPNs

    A Virtual Private Network (VPN) is a useful tool that encrypts data before it passes across the public Internet and then decrypts it when it reaches its destination. Rather like shutters on the...

    Data Security · Privacy

    GDPR: Who is responsible for what?

    The EU General Data Protection Regulation (GDPR) and the Network Information Security (NIS) directive are already causing a flurry of activity among businesses. Who is ultimately responsible for...