The risk of attack is getting closer – mobile devices in focus
Smartphones are part of everyday life, either for private or professional use. However, while many users have taken basic measures to protect their desktop PC or laptop, this is not the case for...
Top Business Benefits of VPNs
President Donald Trump’s recent decision to overturn moves by the Obama administration to stop Internet service providers (ISPs) from selling everyone’s browsing data to advertisers and other third...
Secret role of VPNs in the health and safety of spacecraft
Every day, dozens of man-made probes and satellites travelling through space are in constant communication with their mission headquarters on earth.
Simple steps to a secure public hotspot connection
In just a short time, our working lives have been transformed.
IIoT, Mobile and Cloud Security Take Center Stage at RSAC 2017
The RSA Conference (RSAC) is a regular highlight in the IT security calendar.
A priority on today’s to do list: Please secure remote access once and for all!
Most IT devices have some form of remote access, whether via web browser or app. As long as devices are accessed by an authorized user from within an internal network, this isn’t a problem....
Careful Connections are Key to Mitigating Cyber-Attacks on IIoT Systems
Energy plants and factories have always been prime targets for delivering a devastating setback and psychological blow against an enemy.
Top 5 security vulnerabilities are always the same
The research and analyst firm techconsult issued a summary of the five major security vulnerabilities in SMEs and public organizations in Germany at the start of 2017. Their annual study...
Protecting virtual worlds of data in motion
Corporate IT departments are struggling to manage all the data now residing in the cloud. More and more information is flowing non-stop between physical mobile/Industrial Internet of Things (IIoT)...
Lack of encryption is putting customer data at risk
Security investigators believe hackers behind the Yahoo data breach may have exploited a failure to use proper encryption. If this proves true, then many more organizations may be putting customer...