Post of category Endpoint Management

Cybersecurity Strategy · Data Security · Endpoint Management

Mobile devices need protecting too

Attacks on or by end devices that are not on the company premises happen again and again. A VPN is important and indispensable for remote connections to the corporate network, but it is only half the...

Cybersecurity Strategy · Data Security · Digital Signage · Encryption · Endpoint Management · Internet of Things

Industry Perspectives: The Convergence of IT and OT Enhances Security for the Industrial Internet of Things

Traditionally, information technology (IT) and operational technology (OT) have played separate roles within organizations. Now, with the emergence of the Industrial Internet of Things and the...

Cybercrime · Cybersecurity Strategy · Data Security · Endpoint Management

Urgent, Important or Both: Setting Priorities in IT Security

The fight against cyber threats is often described as an arms race. One side finds new attack vectors, the other side responds with new defense strategies. However, this suggests a greater sense of...

Cloud · Cybersecurity Strategy · Data Security · Digital Signage · Encryption · Endpoint Management · Internet of Things

The Prize for Smart Cities is to Secure a Sustainable Future

At the beginning of October, the Intergovernmental Panel on Climate Change (IPCC) issued its special report on the impact of climate change. The report contains grim warnings for politicians worldwide...

Cybercrime · Endpoint Management

Security risk through USB cable attacks

USB has brought many benefits to computer users. Actually, the inventors and companies involved should be awarded medals. Tangles of cables with incompatible plugs, sockets and formats have steadily...

Cybersecurity Strategy · Data Security · Digital Signage · Encryption · Endpoint Management · Internet of Things · IT policy · VPN

Connecting IIoT Security and Remote Access to Bridge the Gap Between Operational IT and Product/Production IT

In many industries, technology is developing faster than the ability to secure it. As the Industrial Internet of Things (IIoT) permeates finance, retail, logistics, telecommunications, and healthcare...

Cybersecurity Strategy · Data Security · Digital Signage · Endpoint Management · Internet of Things

Protecting Industrial Intelligence Against Attacks

In recent years, many of the world’s isolated industrial control systems (ICS) in manufacturing and critical infrastructure have been joined with information technology (IT) networks. There are clear...

Cybersecurity Strategy · Data Security · Encryption · Endpoint Management

Business travelers should fly under the radar

Thanks to the constant availability of today’s mobile network coverage and public Wi-Fi hotspots, we tend to take connectivity for granted. Our smartphones and mobile devices are with us wherever we...

Cybersecurity Strategy · Encryption · Endpoint Management

Vulnerabilities: a never ending story

Vulnerabilities in software are one of the most important attack vectors for hackers. Unpatched software has been responsible for dozens of large-scale and unfortunately successful attacks in the...

Blog · Data Security · Encryption · Endpoint Management · Internet of Things

What does built-in IIoT security look like?

What Does Built-in IIoT Security Look Like? Companies are racing to take advantage of new revenue opportunities, operational efficiencies and cost savings offered by the multitude of IP-connected...

This website uses cookies

We use cookies to personalize content and analyze access to our website. You can find further information in our data protection policy.

OK