The ten most serious cyber crimes and data breaches to date
People are often quick to adapt – now we don’t seem to blink an eyelid when we read news about another hacked server and the loss of a few million records of personal data. Only the most spectacular...
Strategies for Managing Large-Scale VPN Deployments
Large organizations today are experiencing a rapid evolution in technology that is challenging traditional security systems and infrastructures.
When plan B needs a plan C
Just a few days ago, news began circulating on the internet of a strange problem with Cisco routers which was easy to identify as it caused complete failure. Shortly afterwards, Cisco issued a warning...
Simple steps to a secure public hotspot connection
In just a short time, our working lives have been transformed.
IIoT, Mobile and Cloud Security Take Center Stage at RSAC 2017
The RSA Conference (RSAC) is a regular highlight in the IT security calendar.
A priority on today’s to do list: Please secure remote access once and for all!
Most IT devices have some form of remote access, whether via web browser or app. As long as devices are accessed by an authorized user from within an internal network, this isn’t a problem....
Careful Connections are Key to Mitigating Cyber-Attacks on IIoT Systems
Energy plants and factories have always been prime targets for delivering a devastating setback and psychological blow against an enemy.
Top 5 security vulnerabilities are always the same
The research and analyst firm techconsult issued a summary of the five major security vulnerabilities in SMEs and public organizations in Germany at the start of 2017. Their annual study...
Mitigating Retail Vulnerabilities
Retailers are top targets for cybercriminals.
The IoT gateway next door
Internet of things products are small, networked and unfortunately have almost always little or no security. Sometimes this is down to a lack of willingness by the manufacturer but it is also partly...