Beiträge aus der Kategorie: Cybersecurity Strategy

pexels-photo-96612
Cybersecurity Strategy · Internet of Things · VPN

Careful Connections are Key to Mitigating Cyber-Attacks on IIoT Systems

Energy plants and factories have always been prime targets for delivering a devastating setback and psychological blow against an enemy.

2 Factor Authentication · Cybersecurity Strategy · Data Security

Top 5 security vulnerabilities are always the same

The research and analyst firm techconsult issued a summary of the five major security vulnerabilities in SMEs and public organizations in Germany at the start of 2017. Their annual study...

pexels-photo-296084
Cloud · Cybersecurity Strategy · Data Security · Internet of Things · VPN

Protecting virtual worlds of data in motion

Corporate IT departments are struggling to manage all the data now residing in the cloud. More and more information is flowing non-stop between physical mobile/Industrial Internet of Things (IIoT)...

Cybersecurity Strategy · Encryption · VPN

Lack of encryption is putting customer data at risk

Security investigators believe hackers behind the Yahoo data breach may have exploited a failure to use proper encryption.  If this proves true, then many more organizations may be putting customer...

business-cash-coin-concept-41301
Cybersecurity Strategy · Encryption · VPN

VPN and Bitcoin: A Cloak of Invisibility for Shoppers of Digital Goods

Bitcoin, the digital currency underpinned by block chain technology, first entered circulation in 2009. Though users are only just beginning to scratch the surface of its full potential, Bitcoin is...

pexels-photo-186613
Cybersecurity Strategy · Internet of Things · VPN

Making IIoT Security More Robust

The Christmas season is upon us and retailers are excitedly stocking their shelves.  Once again, Internet-connected consumer gadgets, or Internet of Things (IoT) devices, are expected to be among...

Bundesadler_s
Cybersecurity Strategy · VPN

Vote of confidence for IT security made in Germany

Where is your IT manufacturer based? What used to be a trivial matter of image has now become a security issue. Three years after Edward Snowden's revelations, CEOs understandably feel uncomfortable...

matrix-434035_1280
Cybersecurity Strategy

European Cyber Security Month - A month dedicated to cyber security

Most people claim to know how important IT security is. The reality is somewhat different. Demands on employees time are high, there are millions of distractions and somehow the backup at the end of...

smart building photo
Cybersecurity Strategy · Data Security · Encryption · Internet of Things · Smart Buildings · Smart City

Smart buildings merit smarter security

Architects and city planners first began promoting the concept of Smart Buildings, or Building Automation Systems (BAS), around ten years ago. Smart buildings were meant to deliver untold benefits...

blue arrow and white target
Cybersecurity Strategy · Internet of Things

Relevant security standards for Internet of Things

Virtually every study exploring the benefits of Internet of Things includes some reservations on IT security. According to an analysis by Deutsche Telekom 90% of managers are concerned about security...

Diese Webseite verwendet Cookies

Wir verwenden Cookies, um Inhalte zu personalisieren und die Zugriffe auf unsere Website zu analysieren. Weitere Informationen finden Sie in unserer Datenschutzerklärung.

OK