Post of category Data Security

Cybersecurity Strategy · Data Security · Digital Signage · Encryption · Internet of Things

Facial Recognition Raises Security Stakes on Digital Signage

Facial recognition software is being embedded in digital signage to deliver a more personalized audience experience. The medium is already a target for cyber attackers and mischief makers. Adding...

Cybercrime · Cybersecurity Strategy · Data Security

Through the back door

Companies are now investing a lot of time and money in securing sensitive information. This is a welcome change, even if these efforts are not always consistent or in the right place. Unfortunately...

Data Security

Beat Unintended Consequences of GDPR with VPNs

When EU General Data Protection Regulation (GDPR) was introduced in May 2018, it was supposed to give citizens more control over their online data. Companies had to tell consumers how their personal...

Blog · Cybercrime · Data Security

U.S. Moves to Track Cryptocurrency Transactions

Staying safe while online remains a major concern for most Internet users. Companies of all sizes and across all industries are taking whatever steps necessary to keep their employees safe and...

Cybersecurity Strategy · Data Security · Endpoint Management

Mobile devices need protecting too

Attacks on or by end devices that are not on the company premises happen again and again. A VPN is important and indispensable for remote connections to the corporate network, but it is only half the...

Data Security · Digital Signage · Internet of Things

Europe’s Smart Cities Put Citizens’ Privacy First

For more than a decade, public authorities around the world have been quietly adding many thousands of remote digital sensors to urban infrastructures. Consequently, all kinds of civic amenities from...

Cybersecurity Strategy · Data Security

What "state of the art" means in IT security today

State-of-the-art is an expression used frequently but what does it mean? It is intended to express that current technology is being used but this implicitly excludes visionary technology. Often the...

BYOD · Cybersecurity Strategy · Data Security · Encryption · Internet of Things

The Spy in Your Pocket

From apps that know our every move, to cookies that track each browsing session and large scale social media privacy breaches – our smartphones are constantly spying on us. These days, most people...

Cybercrime · Data Security

The dawn of a new era – taking responsibility for the security of our own data

IT professionals often face different attitudes to IT security. Private individuals, even if they are occasionally in the public interest, generally believe that they "have nothing to hide" and that...

Cybersecurity Strategy · Data Security · Digital Signage · Encryption · Endpoint Management · Internet of Things

Industry Perspectives: The Convergence of IT and OT Enhances Security for the Industrial Internet of Things

Traditionally, information technology (IT) and operational technology (OT) have played separate roles within organizations. Now, with the emergence of the Industrial Internet of Things and the...

This website uses cookies

We use cookies to personalize content and analyze access to our website. You can find further information in our data protection policy.

OK