Posts tagged with security

Blog · Data Security · Encryption · Endpoint Management · Internet of Things

What does built-in IIoT security look like?

What Does Built-in IIoT Security Look Like? Companies are racing to take advantage of new revenue opportunities, operational efficiencies and cost savings offered by the multitude of IP-connected...

Data Security

Extended Mass Surveillance Increases Pressure to Keep Data Comms Private

Congress has approved a six-year extension of Section 702 of the U.S. surveillance law. This means the continuation of PRISM, the controversial mass surveillance program first exposed by Edward...

internetsecurity
Mobile · VPN

Internet Security Programs for Students

Guest blog post from Daniel Waterman

Internet-of-Things
Data Security · Internet of Things

With sensors everywhere, how can we keep data secure?

The idea behind the Internet of Things (IoT) is that everyday objects can connect to each other and exchange data via the Internet. Even the smallest components, such as sensors for measuring...

globe data lock
Data Security

The World after Safe Harbor

In October 2015, the European Court of Justice (ECJ) declared the Safe Harbor Agreement for transferring data to the USA invalid. The decision was based on a lawsuit filed by the Austrian, Maximilian...

Security Defense
Rethink Remote Access · VPN

Smaller Scale Is No Defense: Why SMBs Should Assume They’re Already Targets of Cyberattackers

You would be hard pressed to go a month without hearing about a new data breach or major cyberattack in the headlines. These incidents occur with such regularity nowadays that seemingly every industry...

Guitar
Expert Q&A · Industry Commentary · IT policy · Posts

How One Challenging Gig with My Band Prepared Me for a Career in Cybersecurity

Sometimes, connections between work and play appear when they're least expected. You wouldn't expect, for example, a guitar-shredding metal-head to carry over much from his time on stage to his career...

Remote Office
Industry Commentary · Posts · VPN

OPM Breach Shows Need for 'Nimble' Government Network Security

No matter how you look at it, the Office of Personnel Management (OPM) is on the hook for revealing the records of millions of Americans. The only question is how many millions.

2 Factor Authentication · VPN

[WEBINAR] Two-Factor Authentication for Tighter VPN Security

Remote Access VPNs For Dummies
IT policy · VPN

Healthcare Data Today: In Motion or Out of Control?

This website uses cookies

We use cookies to personalize content and analyze access to our website. You can find further information in our data protection policy.

OK