Enabling Secure Remote Connectivity for Apple Devices
With over one billion active users worldwide, Apple continues to offer the most diverse product line from Apple Watches to Macs, to iPads and iPhones.
Winner Takes It All: Why Net Neutrality is a High Stakes Game
Right now, there’s an almighty tussle going between the telcos and the Internet giants over changes to Net Neutrality rules.
The next major incident is simply a matter of time
When WannaCry dominated the headlines, manufacturers fell over one another to make a statement. On the whole, the comments can be divided into two groups. Some reminded customers that not patching...
Older ATMs Under Fire as IoT Starts to Bite
The EU General Data Protection Regulation
Data protection is going to get expensive: The EU General Data Protection Regulation is on its way.
The ten most serious cyber crimes and data breaches to date
People are often quick to adapt – now we don’t seem to blink an eyelid when we read news about another hacked server and the loss of a few million records of personal data. Only the most spectacular...
Top 5 security vulnerabilities are always the same
The research and analyst firm techconsult issued a summary of the five major security vulnerabilities in SMEs and public organizations in Germany at the start of 2017. Their annual study...
Mitigating Retail Vulnerabilities
Retailers are top targets for cybercriminals.
The IoT gateway next door
Internet of things products are small, networked and unfortunately have almost always little or no security. Sometimes this is down to a lack of willingness by the manufacturer but it is also partly...
Protecting virtual worlds of data in motion
Corporate IT departments are struggling to manage all the data now residing in the cloud. More and more information is flowing non-stop between physical mobile/Industrial Internet of Things (IIoT)...