This website uses cookies

We use cookies to personalize content and analyze access to our website. You can find further information in our data protection policy.

OK

Post of category Data Security

Blog · Cybersecurity Strategy · Data Security · Encryption · Internet of Things

If future IIoT security lies at the Edge, then so do VPNs

It’s time to stop talking about cloud computing as an emerging technology. So many large enterprises now use cloud services as part of their processing needs that it is safe to say cloud computing...

Blog · Connected Cars · Data Security

Software Holds the Key to Connected Car Security

Software is fast becoming the most important component of the modern car. Already, digital engineering advances that enhance attributes like fuel efficiency, engine management and in-car entertainment...

Blog · Cloud · Cybersecurity Strategy · Data Security

The Cloud Presents New Risks for Financial Services

The world’s major financial institutions know the winds of change are here. They are well aware that if they stick to traditional banking methods underpinned by decades-old technology they will be...

Blog · 2 Factor Authentication · Cybersecurity Strategy · Data Security

Friend or Foe: The Importance of Multi-Factor Authentication

The days when only permanent, office-based staff with company-approved devices could have remote access to corporate resources via Virtual Private Networks (VPNs) are long gone. Now those needing...

Cybercrime · Cybersecurity Strategy · Data Security

Tiny loopholes that can wreak havoc

Pentesters only need a tiny loophole to gain access to the victim's network and discover and exploit further vulnerabilities. Companies who commission pentesters understandably do not publish any...

Data Security

Easing Hospitals' Mobile Data Security Worries

Mobile communications devices are transforming healthcare services worldwide. Whether helping front line staff to share electronic medical records (EMR), deliver more timely diagnoses through remote...

Cybersecurity Strategy · Data Security

ISPs make a play for control of data privacy

Forget Facebook, forget Google, forget Amazon – privacy defenders they most certainly are not, but their transgressions may prove to be nothing compared to the privacy threat currently posed by the...

Cybersecurity Strategy · Data Security · Digital Signage · Encryption · Endpoint Management · Internet of Things · IT policy · VPN

Connecting IIoT Security and Remote Access to Bridge the Gap Between Operational IT and Product/Production IT

In many industries, technology is developing faster than the ability to secure it. As the Industrial Internet of Things (IIoT) permeates finance, retail, logistics, telecommunications, and healthcare...

Blog · Data Security · Encryption

Retailers must balance data privacy with personalization

The retail industry is increasingly moving online. In its figures for 2017, the U.S. Census Bureau cited national online retail sales at $119 billion. Meanwhile, the Facebook privacy scandal has...

Cybersecurity Strategy · Data Security

Encryption is essential

The fact that information and IT security has attracted a lot of attention in mainstream media in recent years is a positive development. The more often we hear about something, the greater our...