Beiträge aus der Kategorie: Data Security

Blog · Cybersecurity Strategy · Data Security · Encryption

Pressure Grows on Banks to Improve Data Privacy Protection

News that Facebook is to introduce a crypto currency has put banking regulators worldwide on red alert. On the surface, the move by tech giants into financial services is good for customers....

Cybersecurity Strategy · Data Security · Encryption · Internet of Things

Voice-Assisted Shopping Calls for Security by Design

For the past two decades, the retail sector has had to wrestle with constant change. Successive technologies have effectively turned the industry on its head. Today’s chains arguably set more store...

Cybersecurity Strategy · Data Security

GDPR: Has disaster been avoided or is this the calm before the storm?

Can you think back to the end of May 2018? Companies were busy flooding their customer's inboxes with emotional appeals or legal notices looking for their consent to data processing. It was shortly...

Cybersecurity Strategy · Data Security · Digital Signage · Encryption · Endpoint Management · Internet of Things

What Will 5G Mean for Data Privacy?

President Trump’s decision to blacklist Huawei has thrust next-generation 5G data communications suddenly into the media spotlight. The Chinese telecommunications giant currently leads the world in...

Cloud · Cybersecurity Strategy · Data Security · Endpoint Management

Security basics for the cloud

More and more companies are using public cloud computing resources for their IT requirements. Companies often test the water first with pilot projects to explore how cloud computing could work in...

Cloud · Cybersecurity Strategy · Data Security · Endpoint Management · Internet of Things

Top Cloud Security Risks for Healthcare

Healthcare already has some of the most varied and complicated IT environments of any industry. Telemedicine, gene sequencing, patient electronic healthcare records (EHRs), radiology and digital...

Cybercrime · Data Security

Intel processors: More holes than Swiss cheese?

Things had just begun to quieten down at Intel after Spectre and Meltdown, as the next dramatically named processor security vulnerabilities were announced. The ZombieLoad and Store-to-Leak Forwarding...

Cybersecurity Strategy · Data Security · Encryption · Endpoint Management

Five Common Problems with Consumer VPNs

The recent Facebook debacle and other data privacy scandals have fueled a rising interest in virtual private network (VPN) software among consumers. Many people have adopted them for protecting their...

Cybercrime · Data Security · Privacy

My data or yours?

Many articles have been published on who can do what with personal data. Some focus on particular applications or services. In the recent discussion of the availability of DNS over HTTPS, many have...

Cybersecurity Strategy · Data Security · Internet of Things

Cloud-Based Remote Access Becomes Pivotal to Managing IIoT Security

Industrial Revolution 4.0 has fundamentally changed how manufacturing systems are managed. Highly-specialized operational technology (OT) is now being joined up with Industrial Internet of Things...

Diese Webseite verwendet Cookies

Wir verwenden Cookies, um Inhalte zu personalisieren und die Zugriffe auf unsere Website zu analysieren. Weitere Informationen finden Sie in unserer Datenschutzerklärung.

OK