• The Secret to Effective Remote Access VPN Management

    Cybercrime · Data Security · Privacy

    My data or yours?

    Many articles have been published on who can do what with personal data. Some focus on particular applications or services. In the recent discussion of the availability of DNS over HTTPS, many have...

    Cybersecurity Strategy · Data Security · Internet of Things

    Cloud-Based Remote Access Becomes Pivotal to Managing IIoT Security

    Industrial Revolution 4.0 has fundamentally changed how manufacturing systems are managed. Highly-specialized operational technology (OT) is now being joined up with Industrial Internet of Things...

    Blog · Cybersecurity Strategy · Data Security

    Tech Privacy Moves Center Stage

    The repeated failure of social media companies to properly protect personal data has so undermined consumer confidence that most people now believe total privacy is impossible in the modern digital...

    Certificates · Data Security · Internet of Things

    Industrial Internet of Things Security Certification in Europe

    In the early days of the Internet of Things (IoT) and Industrial Internet of Things (IIoT), the potential of the new technology often overshadowed the security risks. After several incidents involving...

    Cybersecurity Strategy · Data Security · Digital Signage · Encryption · Internet of Things

    Facial Recognition Raises Security Stakes on Digital Signage

    Facial recognition software is being embedded in digital signage to deliver a more personalized audience experience. The medium is already a target for cyber attackers and mischief makers. Adding...

    Cybercrime · Cybersecurity Strategy · Data Security

    Through the back door

    Companies are now investing a lot of time and money in securing sensitive information. This is a welcome change, even if these efforts are not always consistent or in the right place. Unfortunately...

    Data Security

    Beat Unintended Consequences of GDPR with VPNs

    When EU General Data Protection Regulation (GDPR) was introduced in May 2018, it was supposed to give citizens more control over their online data. Companies had to tell consumers how their personal...

    Blog · Cybercrime · Data Security

    U.S. Moves to Track Cryptocurrency Transactions

    Staying safe while online remains a major concern for most Internet users. Companies of all sizes and across all industries are taking whatever steps necessary to keep their employees safe and...

    Cybersecurity Strategy · Data Security · Endpoint Management

    Mobile devices need protecting too

    Attacks on or by end devices that are not on the company premises happen again and again. A VPN is important and indispensable for remote connections to the corporate network, but it is only half the...

    Data Security · Digital Signage · Internet of Things

    Europe’s Smart Cities Put Citizens’ Privacy First

    For more than a decade, public authorities around the world have been quietly adding many thousands of remote digital sensors to urban infrastructures. Consequently, all kinds of civic amenities from...

    This website uses cookies

    We use cookies to personalize content and analyze access to our website. You can find further information in our data protection policy.