2019

Cloud · Cybersecurity Strategy · Data Security · Endpoint Management · Internet of Things

Top Cloud Security Risks for Healthcare

Healthcare already has some of the most varied and complicated IT environments of any industry. Telemedicine, gene sequencing, patient electronic healthcare records (EHRs), radiology and digital...

Cybercrime · Data Security

Intel processors: More holes than Swiss cheese?

Things had just begun to quieten down at Intel after Spectre and Meltdown, as the next dramatically named processor security vulnerabilities were announced. The ZombieLoad and Store-to-Leak Forwarding...

Cybersecurity Strategy · Data Security · Encryption · Endpoint Management

Five Common Problems with Consumer VPNs

The recent Facebook debacle and other data privacy scandals have fueled a rising interest in virtual private network (VPN) software among consumers. Many people have adopted them for protecting their...

Cybercrime · Data Security · Privacy

My data or yours?

Many articles have been published on who can do what with personal data. Some focus on particular applications or services. In the recent discussion of the availability of DNS over HTTPS, many have...

Cybersecurity Strategy · Data Security · Internet of Things

Cloud-Based Remote Access Becomes Pivotal to Managing IIoT Security

Industrial Revolution 4.0 has fundamentally changed how manufacturing systems are managed. Highly-specialized operational technology (OT) is now being joined up with Industrial Internet of Things...

Blog · Cybersecurity Strategy · Data Security

Tech Privacy Moves Center Stage

The repeated failure of social media companies to properly protect personal data has so undermined consumer confidence that most people now believe total privacy is impossible in the modern digital...

Certificates · Data Security · Internet of Things

Industrial Internet of Things Security Certification in Europe

In the early days of the Internet of Things (IoT) and Industrial Internet of Things (IIoT), the potential of the new technology often overshadowed the security risks. After several incidents involving...

Cybersecurity Strategy · Data Security · Digital Signage · Encryption · Internet of Things

Facial Recognition Raises Security Stakes on Digital Signage

Facial recognition software is being embedded in digital signage to deliver a more personalized audience experience. The medium is already a target for cyber attackers and mischief makers. Adding...

Cybercrime · Cybersecurity Strategy · Data Security

Through the back door

Companies are now investing a lot of time and money in securing sensitive information. This is a welcome change, even if these efforts are not always consistent or in the right place. Unfortunately...

Data Security

Beat Unintended Consequences of GDPR with VPNs

When EU General Data Protection Regulation (GDPR) was introduced in May 2018, it was supposed to give citizens more control over their online data. Companies had to tell consumers how their personal...

This website uses cookies

We use cookies to personalize content and analyze access to our website. You can find further information in our data protection policy.

OK