Post of category Encryption

Encryption · Endpoint Management · VPN

Side-step the Internet censorship threat

Most people in the Western world regard privacy as one of most fundamental rights in a democratic society. They also take it for granted that these democratic principles apply equally to the Internet....

shield
Data Security · Encryption · Endpoint Management · VPN

VPNs can ease privacy concerns

High profile data breaches at companies like Mossack Fonseca, Target, Home Depot and Wendy’s along with Government controversies like Edward Snowden and the FBI’s legal suit against Apple after the...

smart building photo
Cybersecurity Strategy · Data Security · Encryption · Internet of Things · Smart Buildings · Smart City

Smart buildings merit smarter security

Architects and city planners first began promoting the concept of Smart Buildings, or Building Automation Systems (BAS), around ten years ago. Smart buildings were meant to deliver untold benefits...

times-square-401652_1280
Digital Signage · Encryption · Internet of Things · VPN

Securing digital signage systems

The average company network has many more devices connecting to it than even just a few years ago. In addition to traditional workstations there are now smartphones and tablets alongside a wide...

Connected Cars-pexels-photo-60803
Connected Cars · Encryption · Endpoint Management · Internet of Things

Connected cars: fresh safety hazards on the road ahead

Advances in connected car technology are set to radically alter the future of driving for everyone. Among the promised benefits is the ability for cars to ‘learn’ from each other, provide early...

money-256314_1920
Cybersecurity Strategy · Data Security · Encryption · VPN

Trouble in store? Don’t forget VPN

For a couple of years now security breaches in the retail sector have seldom been out of the headlines. Breaches at large retail chains like Target, Neiman Marcus and The Home Depot in 2014 were...

NCP-PublicHotSpot300x250
Cybersecurity Strategy · Encryption · Public Hotspot · VPN

Threats at Public Hotspots

Germany is reported to be increasingly left behind in terms of digitization in public spaces. The reason: There are just not enough hotspots available. A political decision has now been taken to...

big-data-1086802_1920
Data Security · Encryption · Endpoint Management · VPN

Big data, big security questions

Half of enterprises today store sensitive information within big data environments (up from 31 percent in 2015). Influential agencies like ENISA warn there are considerable cyber risks from using big...

hands-coffee-smartphone-technology
Encryption · Endpoint Management · Mobile · VPN

Mobile payments and security -- money walks, money talks

Once upon a time a mobile phone was something we used for talking. Today making a call ranks sixth on the list of most common uses for a mobile phone. Now there’s a new kid on the block that, in time,...

safe-913452_1920
Cybersecurity Strategy · Encryption · Endpoint Management · Internet of Things

Internet of Things raises fresh security challenges for industry

For many years industries like oil and gas, electricity, agriculture and utilities have relied on operational communications infrastructure outside the main corporate network to collect data and...

This website uses cookies

We use cookies to personalize content and analyze access to our website. You can find further information in our data protection policy.

OK