Beiträge aus der Kategorie: Cybersecurity Strategy

Cloud · Cybersecurity Strategy · Data Security · Internet of Things

Trends for the year ahead

Another year has passed, and we are already looking forward to 12 months of fresh inspiration for companies and users, and new and exciting trends in information security. Last year, various...

Cybersecurity Strategy · Data Security · Encryption · Internet of Things

Smart Cities Need Smart Security

Through the implementation of smart technology, cities around the world are benefiting from increased efficiency, automation, connectivity, smart transportation, and a more sustainable...

Cybercrime · Cybersecurity Strategy · Data Security

Office 365 - The enemy in my inbox

Just as things don’t always go to plan in practice this is also true of information security. Although the security world are discussing defense strategies involving microsegmentation and artificial...

Cybercrime · Cybersecurity Strategy · Data Security · Encryption · HIPAA

Best Practices for Securing Healthcare Data

The escalation of ransomware and trojan malware combined with the lack of endpoint security caused the healthcare sector to suffer from massive data breaches in 2019. As healthcare organizations rely...

Cybercrime · Cybersecurity Strategy · Data Security · Encryption · Endpoint Management

The Worst Data Breaches of 2019

Another day, another data breach. With more than five thousand data breaches and over seven billion records exposed, 2019 was the worst year on record for breach activity. According to research from...

Cybercrime · Cybersecurity Strategy · Data Security · Encryption

Online Shopping this Holiday Season? Here's How to Stay Protected

With the holiday season in full swing, retailers and e-commerce stores are once again competing with the lowest prices and best bargain deals to draw in new customers and increase sales. Nearly 190...

Cybersecurity Strategy · Data Security · Endpoint Management

Apple macOS Catalina: Plenty of new features and a spotlight on security

The current major release of macOS, Catalina was announced recently. As ever with Apple, the list of changes is very long and ranges from using an iPad as a second screen (SideKick) to the...

Cybersecurity Strategy · Data Security · Encryption

Anonymous Database Data is Nothing without Encryption

In recent years, the world has witnessed a major change in the way personal data is managed and protected. EU General Data Protection Regulation (GDPR) and other regulatory initiatives have granted...

Cloud · Cybersecurity Strategy · Data Security · Internet of Things

IIoT Fog Computing Must Not Cloud the Need for Cybersecurity

Cloud computing and the Industrial Internet of Things (IIoT) are opening up all kinds of new horizons for manufacturing and industry. From connected cars and smart cities to real-time analytics and 5G...

Cybersecurity Strategy · Endpoint Management

Cyber Security Month – Reason to celebrate?

This October is time again for the European Cyber Security Month (ECSM), an initiative which is managed by the European Union. During the campaign which lasts throughout the month, the EU aims to...

Diese Webseite verwendet Cookies

Wir verwenden Cookies, um Inhalte zu personalisieren und die Zugriffe auf unsere Website zu analysieren. Weitere Informationen finden Sie in unserer Datenschutzerklärung.

OK