Post of category Encryption

Blog · Cybersecurity Strategy · Data Security · Encryption

Pressure Grows on Banks to Improve Data Privacy Protection

News that Facebook is to introduce a crypto currency has put banking regulators worldwide on red alert. On the surface, the move by tech giants into financial services is good for customers....

Cybersecurity Strategy · Data Security · Encryption · Internet of Things

Voice-Assisted Shopping Calls for Security by Design

For the past two decades, the retail sector has had to wrestle with constant change. Successive technologies have effectively turned the industry on its head. Today’s chains arguably set more store...

Cybersecurity Strategy · Data Security · Digital Signage · Encryption · Endpoint Management · Internet of Things

What Will 5G Mean for Data Privacy?

President Trump’s decision to blacklist Huawei has thrust next-generation 5G data communications suddenly into the media spotlight. The Chinese telecommunications giant currently leads the world in...

Cybersecurity Strategy · Data Security · Encryption · Endpoint Management

Five Common Problems with Consumer VPNs

The recent Facebook debacle and other data privacy scandals have fueled a rising interest in virtual private network (VPN) software among consumers. Many people have adopted them for protecting their...

Cybersecurity Strategy · Data Security · Digital Signage · Encryption · Internet of Things

Facial Recognition Raises Security Stakes on Digital Signage

Facial recognition software is being embedded in digital signage to deliver a more personalized audience experience. The medium is already a target for cyber attackers and mischief makers. Adding...

BYOD · Cybersecurity Strategy · Data Security · Encryption · Internet of Things

The Spy in Your Pocket

From apps that know our every move, to cookies that track each browsing session and large scale social media privacy breaches – our smartphones are constantly spying on us. These days, most people...

Cybersecurity Strategy · Data Security · Digital Signage · Encryption · Endpoint Management · Internet of Things

Industry Perspectives: The Convergence of IT and OT Enhances Security for the Industrial Internet of Things

Traditionally, information technology (IT) and operational technology (OT) have played separate roles within organizations. Now, with the emergence of the Industrial Internet of Things and the...

Cybersecurity Strategy · Data Security · Encryption

Local Laws Start to Fragment Privacy Picture

For well over a decade, the leading technology companies have been able to build hugely profitable businesses on the back of people’s personal data. Now, for the first time, serious questions are...

Cloud · Cybersecurity Strategy · Data Security · Digital Signage · Encryption · Endpoint Management · Internet of Things

The Prize for Smart Cities is to Secure a Sustainable Future

At the beginning of October, the Intergovernmental Panel on Climate Change (IPCC) issued its special report on the impact of climate change. The report contains grim warnings for politicians worldwide...

Blog · Cybersecurity Strategy · Data Security · Encryption · Internet of Things

If future IIoT security lies at the Edge, then so do VPNs

It’s time to stop talking about cloud computing as an emerging technology. So many large enterprises now use cloud services as part of their processing needs that it is safe to say cloud computing...

This website uses cookies

We use cookies to personalize content and analyze access to our website. You can find further information in our data protection policy.

OK