Beiträge aus der Kategorie: IT policy

Cybersecurity Strategy · IT policy

Realizing the potential of exploit toolkits

Anti-virus companies have identified a new trend: Criminals are increasingly using open source software instead of developing or purchasing their own malware. Kaspersky Lab recently revealed several...

Internet-of-Things
Cybersecurity Strategy · IT policy

Vulnerability scan for Industry 4.0 with LARS

Not a day goes by without Industry 4.0 being touted as the future of the manufacturing industry. And it's true, the digitization of production environments is already gaining traction, in some sectors...

Business infographic icons set. Illustration eps10
Cybersecurity Strategy · IT policy

Big Data and IT Security – SIEM as an Analysis Tool

Over the last few years, gleaning useful information from massive amounts of data has also become more difficult for IT security and approaches to Big Data and information analysis are a critical...

Young woman with laptop
IT policy

Cybersecurity Isn’t Generational: Why Millennials May Not Be the Tech Hope of the Future

Of all the assumptions made and beliefs held about millennials, one of the most common is that they’re uniquely tech-savvy. After all, this is the first generation to grow up being exposed first to...

cog
IT policy

Plan, Install and Operate VPN Gateways in Accordance with the BSI’s Basic IT Security Manual

While the core focus of IT administrators may not be security, they are often tasked with looking after network security, leading them to sometimes feel overwhelmed. They might ask themselves: “How do...

Business Phone and Tablet
IT policy

The BYOD Backlash: Enterprises Search for a New Mobile Device Management Standard

If corporate Bring-Your-Own-Device (BYOD) policies are intended to be an acceptable compromise between employees and employers, why do both parties seem to be so consistently displeased with them?

Guitar
Expert Q&A · Industry Commentary · IT policy · Posts

How One Challenging Gig with My Band Prepared Me for a Career in Cybersecurity

Sometimes, connections between work and play appear when they're least expected. You wouldn't expect, for example, a guitar-shredding metal-head to carry over much from his time on stage to his career...

VPN-Haus-Logo2
Industry Commentary · IT policy

IT Security? “Yes Please,” says Uncle Sam – But Offers No Tangible Help

When it comes to IT security, government agencies around the world are aware of the challenges and risks small and medium-sized enterprises (SMEs) face. So it only figures that they offer help, in...

Industry Commentary · IT policy

Europe: More than Just 'Stumbling Forward' to Improved Cybersecurity

[caption id="attachment_5673" align="alignright" width="200"] Image via Creative Commons/Xavier Hape (CC BY 2.0)[/caption]

HIPAA · IT policy

White House Turns Attention to Cybersecurity

Cyberattackers and hackers operate in the shadows, lurking away from where conventional law enforcement can easily identify and investigate them. They prefer secrecy and anonymity.

Diese Webseite verwendet Cookies

Wir verwenden Cookies, um Inhalte zu personalisieren und die Zugriffe auf unsere Website zu analysieren. Weitere Informationen finden Sie in unserer Datenschutzerklärung.

OK