• The Secret to Effective Remote Access VPN Management

    Cloud · Data Security · Endpoint Management

    More trouble in the cloud

    If you leave out Germany – which is well-known for taking a strict approach to privacy concerns, cloud growth figures are impressive. This year, cloud service revenue is expected to reach USD 212...

    Cybercrime · Cybersecurity Strategy · Data Security · Internet of Things

    Risk to Business Travelers’ Data Grows

    Business travel is a fertile hunting ground for hackers. Sensitive company data is seldom more at risk than when employees are on the road. The travel sector is notoriously susceptible to large scale...

    Cybercrime · Cybersecurity Strategy · Data Security

    A risky business: what happens when transferring risk goes wrong?

    The title of this article might seem a little confusing so let's start by breaking things down. Once a risk analysis has been conducted and the risks facing a company have been identified, for example...

    Cybersecurity Strategy · Data Security · Encryption · Internet of Things

    Tech Giants Talk the Data Privacy Talk

    The reputation of Silicon Valley’s elite brands is in urgent need of repair. In recent years, data scandals from breaches of personal information to alleged interference with democratic elections...

    Cybercrime · Cybersecurity Strategy · Data Security

    ECSM 2019 – Cyber security affects us all

    Cyber security has many facets and affects all areas of our digital lives, both professional and private. In some environments, information security is mandatory where regulatory requirements foresee...

    Blog · Cybersecurity Strategy · Data Security · Encryption

    Pressure Grows on Banks to Improve Data Privacy Protection

    News that Facebook is to introduce a crypto currency has put banking regulators worldwide on red alert. On the surface, the move by tech giants into financial services is good for customers....

    Cybersecurity Strategy · Data Security · Encryption · Internet of Things

    Voice-Assisted Shopping Calls for Security by Design

    For the past two decades, the retail sector has had to wrestle with constant change. Successive technologies have effectively turned the industry on its head. Today’s chains arguably set more store...

    Cybersecurity Strategy · Data Security

    GDPR: Has disaster been avoided or is this the calm before the storm?

    Can you think back to the end of May 2018? Companies were busy flooding their customer's inboxes with emotional appeals or legal notices looking for their consent to data processing. It was shortly...

    Cybersecurity Strategy · Data Security · Digital Signage · Encryption · Endpoint Management · Internet of Things

    What Will 5G Mean for Data Privacy?

    President Trump’s decision to blacklist Huawei has thrust next-generation 5G data communications suddenly into the media spotlight. The Chinese telecommunications giant currently leads the world in...

    Cloud · Cybersecurity Strategy · Data Security · Endpoint Management

    Security basics for the cloud

    More and more companies are using public cloud computing resources for their IT requirements. Companies often test the water first with pilot projects to explore how cloud computing could work in...

    This website uses cookies

    We use cookies to personalize content and analyze access to our website. You can find further information in our data protection policy.