2018

New threats posed by closing the gap between IT and OT
The gap between office Information Technology (IT) and Operational Technology (OT) −everything that networks, controls and evaluates machines in industrial environments − has been closing for some...

Connecting IIoT Security and Remote Access to Bridge the Gap Between Operational IT and Product/Production IT
In many industries, technology is developing faster than the ability to secure it. As the Industrial Internet of Things (IIoT) permeates finance, retail, logistics, telecommunications, and healthcare...

Summer, sun and hackers – Tips for avoiding IT security risks on holiday
If you feel great after your holiday but find your bank account empty, perhaps the shopping trip on the Via Monte Napoleone went a little too far. But if you are not the culprit, cybercriminals may...

Retailers must balance data privacy with personalization
The retail industry is increasingly moving online. In its figures for 2017, the U.S. Census Bureau cited national online retail sales at $119 billion. Meanwhile, the Facebook privacy scandal has...

Encryption is essential
The fact that information and IT security has attracted a lot of attention in mainstream media in recent years is a positive development. The more often we hear about something, the greater our...

Protecting Industrial Intelligence Against Attacks
In recent years, many of the world’s isolated industrial control systems (ICS) in manufacturing and critical infrastructure have been joined with information technology (IT) networks. There are clear...

Another day, another GDPR mail
The world didn’t stop turning on May 25 when the EU General Data Protection Regulation (GDPR) came into force, despite the mass panic among many companies, as if they had just seen an intercity...

Business travelers should fly under the radar
Thanks to the constant availability of today’s mobile network coverage and public Wi-Fi hotspots, we tend to take connectivity for granted. Our smartphones and mobile devices are with us wherever we...

Can Governments be trusted to keep our data private?
Governments and state agencies everywhere would like us to believe that our personal data is safe in their hands. They say this information is vital. Without it, they claim, it would be impossible to...

WebAuthn – The next nail in the coffin for usernames and passwords
It's a lingering death, but at some point the last username/password combination will be entered. This is a good thing, because one data breach after another shows that neither the private sector nor...