Post of category Cybersecurity Strategy

business-cash-coin-concept-41301
Cybersecurity Strategy · Encryption · VPN

VPN and Bitcoin: A Cloak of Invisibility for Shoppers of Digital Goods

Bitcoin, the digital currency underpinned by block chain technology, first entered circulation in 2009. Though users are only just beginning to scratch the surface of its full potential, Bitcoin is...

pexels-photo-186613
Cybersecurity Strategy · Internet of Things · VPN

Making IIoT Security More Robust

The Christmas season is upon us and retailers are excitedly stocking their shelves.  Once again, Internet-connected consumer gadgets, or Internet of Things (IoT) devices, are expected to be among...

Bundesadler_s
Cybersecurity Strategy · VPN

Vote of confidence for IT security made in Germany

Where is your IT manufacturer based? What used to be a trivial matter of image has now become a security issue. Three years after Edward Snowden's revelations, CEOs understandably feel uncomfortable...

matrix-434035_1280
Cybersecurity Strategy

European Cyber Security Month - A month dedicated to cyber security

Most people claim to know how important IT security is. The reality is somewhat different. Demands on employees time are high, there are millions of distractions and somehow the backup at the end of...

smart building photo
Cybersecurity Strategy · Data Security · Encryption · Internet of Things · Smart Buildings · Smart City

Smart buildings merit smarter security

Architects and city planners first began promoting the concept of Smart Buildings, or Building Automation Systems (BAS), around ten years ago. Smart buildings were meant to deliver untold benefits...

blue arrow and white target
Cybersecurity Strategy · Internet of Things

Relevant security standards for Internet of Things

Virtually every study exploring the benefits of Internet of Things includes some reservations on IT security. According to an analysis by Deutsche Telekom 90% of managers are concerned about security...

Cybersecurity Strategy · IT policy

Realizing the potential of exploit toolkits

Anti-virus companies have identified a new trend: Criminals are increasingly using open source software instead of developing or purchasing their own malware. Kaspersky Lab recently revealed several...

Internet-of-Things
Cybersecurity Strategy · IT policy

Vulnerability scan for Industry 4.0 with LARS

Not a day goes by without Industry 4.0 being touted as the future of the manufacturing industry. And it's true, the digitization of production environments is already gaining traction, in some sectors...

money-256314_1920
Cybersecurity Strategy · Data Security · Encryption · VPN

Trouble in store? Don’t forget VPN

For a couple of years now security breaches in the retail sector have seldom been out of the headlines. Breaches at large retail chains like Target, Neiman Marcus and The Home Depot in 2014 were...

NCP-PublicHotSpot300x250
Cybersecurity Strategy · Encryption · Public Hotspot · VPN

Threats at Public Hotspots

Germany is reported to be increasingly left behind in terms of digitization in public spaces. The reason: There are just not enough hotspots available. A political decision has now been taken to...

This website uses cookies

We use cookies to personalize content and analyze access to our website. You can find further information in our data protection policy.

OK