Beiträge verschlagwortet mit VPN

Cybersecurity Strategy · Data Security · Encryption · Endpoint Management

Getting IT security priorities right

Information security should protect the company's important assets, be transparent, unobtrusive and always up-to-date, and of course cost nothing. There is not a magic formula to achieve all this but...

Connected Cars · Cybersecurity Strategy · Data Security

Connected Car Data Privacy Goes on Trial

Modern cars know more about us than we might imagine. From driving habits to information about places we’ve visited and even our music tastes, much of the information our cars gather every day is very...

Cloud · Data Security · Endpoint Management

More trouble in the cloud

If you leave out Germany – which is well-known for taking a strict approach to privacy concerns, cloud growth figures are impressive. This year, cloud service revenue is expected to reach USD 212...

hier nicht weiter
2 Factor Authentication · Cybersecurity Strategy · VPN

Another plea for multi-factor authentication

A hacking and cyberespionage group is currently targeting industrial control systems at energy companies. According to a survey by Symantec they have broken into 27 corporate networks so far. The...

juniper_logo
VPN

Progress through partnership

A VPN needs both a client and remote gateway. While NCP offers a complete solution with Secure Enterprise Client and Secure Enterprise VPN Server, some manufacturers only develop their own gateways....

Data protection
Cybercrime · Data Security · VPN

The ten most serious cyber crimes and data breaches to date

People are often quick to adapt – now we don’t seem to blink an eyelid when we read news about another hacked server and the loss of a few million records of personal data. Only the most spectacular...

rsa-conference-image_full-size
Cloud · Cybersecurity Strategy · Internet of Things · Mobile · Shows · VPN

IIoT, Mobile and Cloud Security Take Center Stage at RSAC 2017

The RSA Conference (RSAC) is a regular highlight in the IT security calendar.

Security
Cybersecurity Strategy · Internet of Things · VPN

A priority on today’s to do list: Please secure remote access once and for all!

Most IT devices have some form of remote access, whether via web browser or app. As long as devices are accessed by an authorized user from within an internal network, this isn’t a problem....

internet-of-things
Data Security · Internet of Things · VPN

The IoT gateway next door

Internet of things products are small, networked and unfortunately have almost always little or no security. Sometimes this is down to a lack of willingness by the manufacturer but it is also partly...

pexels-photo-296084
Cloud · Cybersecurity Strategy · Data Security · Internet of Things · VPN

Protecting virtual worlds of data in motion

Corporate IT departments are struggling to manage all the data now residing in the cloud. More and more information is flowing non-stop between physical mobile/Industrial Internet of Things (IIoT)...

Diese Webseite verwendet Cookies

Wir verwenden Cookies, um Inhalte zu personalisieren und die Zugriffe auf unsere Website zu analysieren. Weitere Informationen finden Sie in unserer Datenschutzerklärung.

OK