Post of category Encryption

Cybersecurity Strategy · Encryption · Endpoint Management

Vulnerabilities: a never ending story

Vulnerabilities in software are one of the most important attack vectors for hackers. Unpatched software has been responsible for dozens of large-scale and unfortunately successful attacks in the...

Blog · Data Security · Encryption · Endpoint Management · Internet of Things

What does built-in IIoT security look like?

What Does Built-in IIoT Security Look Like? Companies are racing to take advantage of new revenue opportunities, operational efficiencies and cost savings offered by the multitude of IP-connected...

Blog · Cybersecurity Strategy · Data Security · Encryption

To Succeed, Open Banking Must First Allay Privacy Concerns

The banking industry in the UK and the rest of Europe is undergoing a quiet revolution. Under new rules, EU banks must share the data of consenting customers with third parties. Designed to increase...

vpn
Cybersecurity Strategy · Encryption · Endpoint Management · IT policy · VPN

Four Common Myths about VPNs

A Virtual Private Network (VPN) is a useful tool that encrypts data before it passes across the public Internet and then decrypts it when it reaches its destination. Rather like shutters on the...

laptop-mobile (1)
Cloud · Data Security · Encryption · VPN

Encryption is Central to EU GDPR’s Demand for Privacy

Starting May 2018, any business offering goods and services to European Union (EU) citizens will have to comply with new General Data Protection Regulation (GDPR) rules.

pexels-photo-204475
Cybercrime · Data Security · Encryption · Mobile · VPN

Mitigating Retail Vulnerabilities

Retailers are top targets for cybercriminals.

Eyeball spy
Encryption · Privacy · VPN

Does more surveillance offer more protection?

The trend towards greater state surveillance has become even more obvious since Edward Snowden’s revelations. Governments frequently justify such invasions of their citizens’ privacy as...

Cybersecurity Strategy · Encryption · VPN

Lack of encryption is putting customer data at risk

Security investigators believe hackers behind the Yahoo data breach may have exploited a failure to use proper encryption.  If this proves true, then many more organizations may be putting customer...

business-cash-coin-concept-41301
Cybersecurity Strategy · Encryption · VPN

VPN and Bitcoin: A Cloak of Invisibility for Shoppers of Digital Goods

Bitcoin, the digital currency underpinned by block chain technology, first entered circulation in 2009. Though users are only just beginning to scratch the surface of its full potential, Bitcoin is...

ball
Encryption · Privacy

Naked Privacy: the Legacy of Snowden

“We the public are at one of the last points that we will have to make a difference in how normalised the culture of mass surveillance becomes.”