This website uses cookies

We use cookies to personalize content and analyze access to our website. You can find further information in our data protection policy.

OK
German
  • The Secret to Effective Remote Access VPN Management

    more
    Blog · Cybersecurity Strategy · Data Security · Encryption

    To Succeed, Open Banking Must First Allay Privacy Concerns

    The banking industry in the UK and the rest of Europe is undergoing a quiet revolution. Under new rules, EU banks must share the data of consenting customers with third parties. Designed to increase...

    Data Security · Endpoint Management

    Cover up to avoid unwanted close-ups

    Video surveillance is a sensitive issue, as the discussions about more cameras in public places show. It is no wonder that cameras on devices used in private areas which are capable of taking close-up...

    Blog · Cloud · Data Security · VPN

    Key risks for enterprises committing sensitive data to the cloud

    Economic benefits of migrating enterprise IT environments to services providers are starting to outweigh the security concerns hovering over cloud computing. Until recently, organizations have...

    Cybersecurity Strategy · Data Security · Endpoint Management · Internet of Things · IT policy · Privacy · VPN

    Top Concerns for Digital Assistants in the Workplace

    Digital assistants like Amazon’s Alexa/Echo, Apple Homekit and Google Home are increasingly becoming part of the connected home. The Alexa for Business Platform, announced at the end of 2017, is set...

    Data Security · Internet of Things

    IoT – a paradigm shift?

    Whether 2018 or 2020 is the year of the Internet of Things doesn’t matter – eventually networked devices will take over the home. This will probably happen sooner rather than later, especially with...

    Data Security

    Extended Mass Surveillance Increases Pressure to Keep Data Comms Private

    Congress has approved a six-year extension of Section 702 of the U.S. surveillance law. This means the continuation of PRISM, the controversial mass surveillance program first exposed by Edward...

    Cloud · Data Security

    Security in the cloud

    There are many studies on IT security and depending on the companies behind them and their purpose, the results are always to be treated with caution. But even if the absolute figures leave room for...

    Cybersecurity Strategy · Data Security · Internet of Things · IT policy · VPN

    Protecting Mobile Data Privacy in the Enterprise

    The workplace today is dominated by mobile devices. Employee interaction via smartphone or tablet has become second nature.  They will very likely use them to check work emails, download files...

    Cybercrime · Data Security

    Meltdown and Spectre – play down or panic?

    Users have long since accepted that software errors can be exploited for digital attacks. In fact, these have become so frequent that only highly critical incidents make the news. Hardware is mostly a...

    Cloud · Connected Cars · Digital Signage · Internet of Things · Smart Buildings · VPN

    Keeping Industrial Revolution 4.0’s Treasures Hidden

    The growing use of Industrial Internet of Things (IIoT) worldwide is in the process of turning the concept of smart factories into reality. The phenomenon has been described by observers as the fourth...