• The Secret to Effective Remote Access VPN Management

    Cybersecurity Strategy · Data Security

    What "state of the art" means in IT security today

    State-of-the-art is an expression used frequently but what does it mean? It is intended to express that current technology is being used but this implicitly excludes visionary technology. Often the...

    BYOD · Cybersecurity Strategy · Data Security · Encryption · Internet of Things

    The Spy in Your Pocket

    From apps that know our every move, to cookies that track each browsing session and large scale social media privacy breaches – our smartphones are constantly spying on us. These days, most people...

    Cybercrime · Data Security

    The dawn of a new era – taking responsibility for the security of our own data

    IT professionals often face different attitudes to IT security. Private individuals, even if they are occasionally in the public interest, generally believe that they "have nothing to hide" and that...

    Cybersecurity Strategy · Data Security · Digital Signage · Encryption · Endpoint Management · Internet of Things

    Industry Perspectives: The Convergence of IT and OT Enhances Security for the Industrial Internet of Things

    Traditionally, information technology (IT) and operational technology (OT) have played separate roles within organizations. Now, with the emergence of the Industrial Internet of Things and the...

    Cybercrime · Cybersecurity Strategy · Data Security

    The difference between awareness and action

    Do you remember Equifax? Maybe in combination with the word "hack"? The Equifax hack in September 2017 was one of the most momentous attacks in recent history. The hackers stole about 143 million...

    Cybersecurity Strategy · Data Security

    People’s Online Privacy Protection Matters

    The pressure on social media companies to ensure better privacy protection for users looks set to become a recurring hot button in 2019. News of data leaks and information breaches continue to dog...

    Cloud · Data Security

    Cloud Swings Pendulum Back to IPsec

    A spate of scandals involving large scale data breaches together with increased Internet surveillance by governments has substantially raised business and consumer concerns over online privacy....

    Cybersecurity in 2019

    It's that time of the year again for analysts and security product vendors to look into their crystal balls and make their forecasts for next years trends in cybersecurity. Predicting the future has...

    Cybercrime · Data Security

    The Worst Data Breaches of 2018

    Data is one of the most significant assets in the hands of the corporations in this information technology era. Therefore, a data breach has serious effects on any business. 2018 has seen an increase...

    Cybersecurity Strategy · Data Security · Internet of Things

    Managing IIoT Authentication

    The market for Industrial Internet of Things (IIoT) equipment is growing rapidly. Before long, the installed base of smart industrial machines will exceed the number of remote workers. However,...

    This website uses cookies

    We use cookies to personalize content and analyze access to our website. You can find further information in our data protection policy.