Post of category Cybersecurity Strategy

pexels-photo-296084
Cloud · Cybersecurity Strategy · Data Security · Internet of Things · VPN

Protecting virtual worlds of data in motion

Corporate IT departments are struggling to manage all the data now residing in the cloud. More and more information is flowing non-stop between physical mobile/Industrial Internet of Things (IIoT)...

Cybersecurity Strategy · Encryption · VPN

Lack of encryption is putting customer data at risk

Security investigators believe hackers behind the Yahoo data breach may have exploited a failure to use proper encryption.  If this proves true, then many more organizations may be putting customer...

business-cash-coin-concept-41301
Cybersecurity Strategy · Encryption · VPN

VPN and Bitcoin: A Cloak of Invisibility for Shoppers of Digital Goods

Bitcoin, the digital currency underpinned by block chain technology, first entered circulation in 2009. Though users are only just beginning to scratch the surface of its full potential, Bitcoin is...

pexels-photo-186613
Cybersecurity Strategy · Internet of Things · VPN

Making IIoT Security More Robust

The Christmas season is upon us and retailers are excitedly stocking their shelves.  Once again, Internet-connected consumer gadgets, or Internet of Things (IoT) devices, are expected to be among...

Bundesadler_s
Cybersecurity Strategy · VPN

Vote of confidence for IT security made in Germany

Where is your IT manufacturer based? What used to be a trivial matter of image has now become a security issue. Three years after Edward Snowden's revelations, CEOs understandably feel uncomfortable...

matrix-434035_1280
Cybersecurity Strategy

European Cyber Security Month - A month dedicated to cyber security

Most people claim to know how important IT security is. The reality is somewhat different. Demands on employees time are high, there are millions of distractions and somehow the backup at the end of...

smart building photo
Cybersecurity Strategy · Data Security · Encryption · Internet of Things · Smart Buildings · Smart City

Smart buildings merit smarter security

Architects and city planners first began promoting the concept of Smart Buildings, or Building Automation Systems (BAS), around ten years ago. Smart buildings were meant to deliver untold benefits...

blue arrow and white target
Cybersecurity Strategy · Internet of Things

Relevant security standards for Internet of Things

Virtually every study exploring the benefits of Internet of Things includes some reservations on IT security. According to an analysis by Deutsche Telekom 90% of managers are concerned about security...

Cybersecurity Strategy · IT policy

Realizing the potential of exploit toolkits

Anti-virus companies have identified a new trend: Criminals are increasingly using open source software instead of developing or purchasing their own malware. Kaspersky Lab recently revealed several...

Internet-of-Things
Cybersecurity Strategy · IT policy

Vulnerability scan for Industry 4.0 with LARS

Not a day goes by without Industry 4.0 being touted as the future of the manufacturing industry. And it's true, the digitization of production environments is already gaining traction, in some sectors...

This website uses cookies

We use cookies to personalize content and analyze access to our website. You can find further information in our data protection policy.

OK