Beiträge aus der Kategorie: Data Security

Data Security · Endpoint Management · Internet of Things

Industrial control systems still at risk

While security incidents involving ransomware and  data breaches  have have received much media attention, incidents in the industrial control sector rarely make the headlines. We hear so little, you...

Cybersecurity Strategy · Data Security · Encryption

Anonymous Database Data is Nothing without Encryption

In recent years, the world has witnessed a major change in the way personal data is managed and protected. EU General Data Protection Regulation (GDPR) and other regulatory initiatives have granted...

Cloud · Cybersecurity Strategy · Data Security · Internet of Things

IIoT Fog Computing Must Not Cloud the Need for Cybersecurity

Cloud computing and the Industrial Internet of Things (IIoT) are opening up all kinds of new horizons for manufacturing and industry. From connected cars and smart cities to real-time analytics and 5G...

Cybercrime · Cybersecurity Strategy · Data Security · Internet of Things

Cybercriminals Migrate to Mobile Banking

We live in a connected world. Life without our mobile devices providing us with constant, easy access to a wealth of apps and services is scarcely imaginable. For all this convenience, however, there...

Blog · Cybersecurity Strategy · Data Security · Internet of Things

Senate Moves to Set a Price on Data Privacy

A new bill that could fundamentally change the relationship between major tech companies and their customers is being debated in the U.S. Senate. The move is the first attempt to assign a dollar...

Data Security · Encryption · Internet of Things

Encryption Holds Clue to Solving AI-driven Police Surveillance Fears

Police use of Artificial Intelligence (AI) for law enforcement is coming under intense scrutiny as fears grow over its potential for misuse. Surveillance technologies with embedded AI like biometrics...

Cybersecurity Strategy · Data Security · Encryption · Endpoint Management

Getting IT security priorities right

Information security should protect the company's important assets, be transparent, unobtrusive and always up-to-date, and of course cost nothing. There is not a magic formula to achieve all this but...

Connected Cars · Cybersecurity Strategy · Data Security

Connected Car Data Privacy Goes on Trial

Modern cars know more about us than we might imagine. From driving habits to information about places we’ve visited and even our music tastes, much of the information our cars gather every day is very...

Cybersecurity Strategy · Data Security

No more passwords, please!

The password is probably the best known concept in computing. Probably you will only find people who don't know the word in the most remote areas around the globe. Even the Romans were known to use...

Cybersecurity Strategy · Data Security · Encryption · Endpoint Management · Industry Commentary · Internet of Things

Customer Survey Highlights Secure IoT Communications and Reliable Technical Support from NCP engineering

With the rise of IoT devices in the workplace, it is becoming increasingly important for companies to build secure IoT structures. Secure networking is business-critical for enterprises, service...

Diese Webseite verwendet Cookies

Wir verwenden Cookies, um Inhalte zu personalisieren und die Zugriffe auf unsere Website zu analysieren. Weitere Informationen finden Sie in unserer Datenschutzerklärung.

OK