This website uses cookies

We use cookies to personalize content and analyze access to our website. You can find further information in our data protection policy.

OK

Post of category Cybersecurity Strategy

2 Factor Authentication · Cybersecurity Strategy

Naivety, absurdity or just plain and understandable frustration? Why do we not learn from our mistakes in cybersecurity?

More than half of all users active on the Internet (55%) have been affected by fraud, according to a study by FICO. But this has by no means led to better security precautions and increased awareness....

Cybersecurity Strategy · Data Security

ISPs make a play for control of data privacy

Forget Facebook, forget Google, forget Amazon – privacy defenders they most certainly are not, but their transgressions may prove to be nothing compared to the privacy threat currently posed by the...

Cybercrime · Cybersecurity Strategy · Internet of Things

New threats posed by closing the gap between IT and OT

The gap between office Information Technology (IT) and Operational Technology (OT) −everything that networks, controls and evaluates machines in industrial environments − has been closing for some...

Cybersecurity Strategy · Data Security · Digital Signage · Encryption · Endpoint Management · Internet of Things · IT policy · VPN

Connecting IIoT Security and Remote Access to Bridge the Gap Between Operational IT and Product/Production IT

In many industries, technology is developing faster than the ability to secure it. As the Industrial Internet of Things (IIoT) permeates finance, retail, logistics, telecommunications, and healthcare...

Cybersecurity Strategy · Data Security

Encryption is essential

The fact that information and IT security has attracted a lot of attention in mainstream media in recent years is a positive development. The more often we hear about something, the greater our...

Cybersecurity Strategy · Data Security · Digital Signage · Endpoint Management · Internet of Things

Protecting Industrial Intelligence Against Attacks

In recent years, many of the world’s isolated industrial control systems (ICS) in manufacturing and critical infrastructure have been joined with information technology (IT) networks. There are clear...

Cybersecurity Strategy · Data Security · Encryption · Endpoint Management

Business travelers should fly under the radar

Thanks to the constant availability of today’s mobile network coverage and public Wi-Fi hotspots, we tend to take connectivity for granted. Our smartphones and mobile devices are with us wherever we...

2 Factor Authentication · Cybersecurity Strategy · Data Security

WebAuthn – The next nail in the coffin for usernames and passwords

It's a lingering death, but at some point the last username/password combination will be entered. This is a good thing, because one data breach after another shows that neither the private sector nor...

Cybersecurity Strategy · Encryption · Endpoint Management

Vulnerabilities: a never ending story

Vulnerabilities in software are one of the most important attack vectors for hackers. Unpatched software has been responsible for dozens of large-scale and unfortunately successful attacks in the...

Cybersecurity Strategy · Data Security

Addressing Cryptocurrency Trading Security Issues

Cryptocurrency trading has been gathering pace over the past few years and has been compared to the American Wild West. Early adventurers have faced tremendous risks in terms of extreme market...