Post of category Blog

Blog · Cybersecurity Strategy · Data Security · Encryption · Internet of Things

If future IIoT security lies at the Edge, then so do VPNs

It’s time to stop talking about cloud computing as an emerging technology. So many large enterprises now use cloud services as part of their processing needs that it is safe to say cloud computing...

Blog · Connected Cars · Data Security

Software Holds the Key to Connected Car Security

Software is fast becoming the most important component of the modern car. Already, digital engineering advances that enhance attributes like fuel efficiency, engine management and in-car entertainment...

Blog · Cloud · Cybersecurity Strategy · Data Security

The Cloud Presents New Risks for Financial Services

The world’s major financial institutions know the winds of change are here. They are well aware that if they stick to traditional banking methods underpinned by decades-old technology they will be...

Blog · 2 Factor Authentication · Cybersecurity Strategy · Data Security

Friend or Foe: The Importance of Multi-Factor Authentication

The days when only permanent, office-based staff with company-approved devices could have remote access to corporate resources via Virtual Private Networks (VPNs) are long gone. Now those needing...

Blog · Data Security · Encryption

Retailers must balance data privacy with personalization

The retail industry is increasingly moving online. In its figures for 2017, the U.S. Census Bureau cited national online retail sales at $119 billion. Meanwhile, the Facebook privacy scandal has...

Blog · Data Security · Encryption · Endpoint Management · Internet of Things

What does built-in IIoT security look like?

What Does Built-in IIoT Security Look Like? Companies are racing to take advantage of new revenue opportunities, operational efficiencies and cost savings offered by the multitude of IP-connected...

Blog · Cybersecurity Strategy · Data Security · Encryption

To Succeed, Open Banking Must First Allay Privacy Concerns

The banking industry in the UK and the rest of Europe is undergoing a quiet revolution. Under new rules, EU banks must share the data of consenting customers with third parties. Designed to increase...

Blog · Cloud · Data Security · VPN

Key risks for enterprises committing sensitive data to the cloud

Economic benefits of migrating enterprise IT environments to services providers are starting to outweigh the security concerns hovering over cloud computing. Until recently, organizations have...

This website uses cookies

We use cookies to personalize content and analyze access to our website. You can find further information in our data protection policy.

OK