• The Secret to Effective Remote Access VPN Management

    Cybercrime · Cybersecurity Strategy · Data Security

    The difference between awareness and action

    Do you remember Equifax? Maybe in combination with the word "hack"? The Equifax hack in September 2017 was one of the most momentous attacks in recent history. The hackers stole about 143 million...

    Cybersecurity Strategy · Data Security

    People’s Online Privacy Protection Matters

    The pressure on social media companies to ensure better privacy protection for users looks set to become a recurring hot button in 2019. News of data leaks and information breaches continue to dog...

    Cloud · Data Security

    Cloud Swings Pendulum Back to IPsec

    A spate of scandals involving large scale data breaches together with increased Internet surveillance by governments has substantially raised business and consumer concerns over online privacy....

    Cybersecurity in 2019

    It's that time of the year again for analysts and security product vendors to look into their crystal balls and make their forecasts for next years trends in cybersecurity. Predicting the future has...

    Cybercrime · Data Security

    The Worst Data Breaches of 2018

    Data is one of the most significant assets in the hands of the corporations in this information technology era. Therefore, a data breach has serious effects on any business. 2018 has seen an increase...

    Cybersecurity Strategy · Data Security · Internet of Things

    Managing IIoT Authentication

    The market for Industrial Internet of Things (IIoT) equipment is growing rapidly. Before long, the installed base of smart industrial machines will exceed the number of remote workers. However,...

    Cybercrime · Cybersecurity Strategy · Data Security

    State intervention – Rescue or ruin?

    In recent months, a number of government agencies have been campaigning for state intervention in IT security. This includes an initiative to enforce a minimum level of security for home and small...

    Cybersecurity Strategy · Data Security · Encryption

    Local Laws Start to Fragment Privacy Picture

    For well over a decade, the leading technology companies have been able to build hugely profitable businesses on the back of people’s personal data. Now, for the first time, serious questions are...

    Cybercrime · Cybersecurity Strategy · Data Security · Endpoint Management

    Urgent, Important or Both: Setting Priorities in IT Security

    The fight against cyber threats is often described as an arms race. One side finds new attack vectors, the other side responds with new defense strategies. However, this suggests a greater sense of...

    Cybersecurity Strategy · Data Security · Internet of Things · Privacy · VPN

    How to Keep IoT Devices Secure

    Office environments everywhere are being transformed as more and more Internet of Things (IoT) devices enter the workplace. From intelligent air conditioning units and smart lighting to digital...

    This website uses cookies

    We use cookies to personalize content and analyze access to our website. You can find further information in our data protection policy.