Beiträge verschlagwortet mit end-to-end encryption

Blog · Cybersecurity Strategy · Data Security · Encryption

Pressure Grows on Banks to Improve Data Privacy Protection

News that Facebook is to introduce a crypto currency has put banking regulators worldwide on red alert. On the surface, the move by tech giants into financial services is good for customers....

Cybersecurity Strategy · Data Security · Encryption · Internet of Things

Voice-Assisted Shopping Calls for Security by Design

For the past two decades, the retail sector has had to wrestle with constant change. Successive technologies have effectively turned the industry on its head. Today’s chains arguably set more store...

Cybersecurity Strategy · Data Security

Encryption is essential

The fact that information and IT security has attracted a lot of attention in mainstream media in recent years is a positive development. The more often we hear about something, the greater our...

ShahidShah
Endpoint Management · Expert Q&A · Industry Commentary

Conversation with Shahid Shah on mobile security, Part 2

This week, we feature the second part in our series with Shahid Shah, an enterprise software analyst that specializes in healthcare IT with an emphasis on e-health, E M Rs, data integration, and...

Dass
Expert Q&A · IT policy · Rethink Remote Access

Conversation with Dr. Ruchi Dass on mHealth, Part 2

Editor’s Note: Due to popular demand, we’ve bumped Dr. Ruchi Dass’ next post earlier than it was originally scheduled.

McKeay
Expert Q&A · Industry Commentary · IT policy · PCI

Conversation with Martin McKeay on Network Security, Part 2

We continue our conversation with Martin McKeay, a seasoned IT security professional dedicated to spreading awareness about security and privacy through his “Network Security Blog” and podcast series.

McKeay
Expert Q&A · Industry Commentary · PCI

Conversation with Martin McKeay on Network Security, Part 1

With more than a decade of experience in the IT and security field, Martin McKeay is a seasoned professional dedicated to spreading awareness about security and privacy through his “Network Security...

Diese Webseite verwendet Cookies

Wir verwenden Cookies, um Inhalte zu personalisieren und die Zugriffe auf unsere Website zu analysieren. Weitere Informationen finden Sie in unserer Datenschutzerklärung.

OK